fkie_cve-2011-2424
Vulnerability from fkie_nvd
Published
2011-08-15 21:55
Modified
2024-11-21 01:28
Severity ?
Summary
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted SWF file, as demonstrated by "about 400 unique crash signatures."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E2EB42D-0691-443A-A6D1-19264A156A34", "versionEndIncluding": "10.3.181.36", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "7143E94B-F3CD-4E32-A7BB-C72C816EEACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*", "matchCriteriaId": "4654752C-F677-4066-8C48-BAD09392A594", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDFF4A51-C936-4C5B-8276-FD454C9E4F40", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5ECC9D7-3386-4FEA-9218-91E31FF90F3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "6E81EA32-9621-4ACE-9191-2E9B8C24D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B0E10D6-6348-471B-918A-60AAE2AC5F86", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7FBE855-7EE3-46F2-9FA1-0366AC8C5D24", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "F0E93289-6EE0-401A-958D-F59D2CDAE2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*", "matchCriteriaId": "A67FC00F-0C85-4DD7-81EA-65533EABC767", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "14E67AD7-0791-4D5D-A3B2-E173088B5228", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "EAF07696-9C85-470E-B608-1B0193CAFB6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*", "matchCriteriaId": "0FA3E556-BF8F-4D30-8DE5-09DA3FD8D5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0DC1B9D-686D-46A3-B9F4-DD4E078DF74D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*", "matchCriteriaId": "4BC3ABBA-8B36-448D-883B-C675C202028A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*", "matchCriteriaId": "EF2A52D9-0A1C-4E53-AFA2-148FF03D23A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*", "matchCriteriaId": "A82D5B56-44E0-4120-B73E-0A1155AF4B05", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E895107-ED8A-4F88-87C3-935EAE299C01", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*", "matchCriteriaId": "1752F67C-75A9-4226-AB30-A94EB6C85526", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "4007D621-A0BC-4927-82A7-10D73802BCF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "641776AE-5408-439E-8290-DD9324771874", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "138A932A-D775-46A2-86EC-3C03C96884C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "D12E3957-D7B2-4F3B-BB64-8B50B8958DEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5537E-3153-400D-9F9B-91E7F1218C8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*", "matchCriteriaId": "32912721-F750-4C20-B999-E728F7D3A85D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*", "matchCriteriaId": "6693B1C4-B2A9-4725-AD0E-A266B9DF55AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*", "matchCriteriaId": "A95FA639-346C-491C-81A8-6C2A7B01AA19", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9F1E5AB-DEFA-42FC-A299-C8EEB778F9C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*", "matchCriteriaId": "FC7DD938-F963-4E03-B66B-F00436E4EA9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*", "matchCriteriaId": "351825F4-227D-4743-A74B-EAFC1034500B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2A0777F-22C2-4FD5-BE81-8982BE6874D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "F35F86B6-D49A-40F4-BFFA-5D6BBA2F7D8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*", "matchCriteriaId": "600DDA9D-6440-48D1-8539-7127398A8678", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "B4D5E27C-F6BF-4F84-9B83-6AEC98B4AA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "934A869D-D58D-4C36-B86E-013F62790585", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "ACFA6611-99DA-48B0-89F7-DD99B8E30334", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*", "matchCriteriaId": "59AF804B-BD7A-4AD7-AD44-B5D980443B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "F5D52F86-2E38-4C66-9939-7603367B8D0E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*", "matchCriteriaId": "0557AA2A-FA3A-460A-8F03-DC74B149CA3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FC04ABF-6191-4AA5-90B2-E7A97E6C6005", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*", "matchCriteriaId": "F22F1B02-CCF5-4770-A79B-1F58CA4321CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*", "matchCriteriaId": "93957171-F1F4-43ED-A8B9-2D36C81EB1F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE89894-E492-4380-8A2B-4CDD3A15667A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C6ED706-BAF2-4795-B597-6F7EE8CA8911", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*", "matchCriteriaId": "260E2CF6-4D15-4168-A933-3EC52D8F93FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*", "matchCriteriaId": "D50BF190-2629-49A8-A377-4723C93FFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E59E2AD-38BB-46DF-AC0D-D36F1F259AD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD04F04C-30CE-4A8D-B254-B10DEF62CEEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*", "matchCriteriaId": "96DC7742-499D-4BF5-9C5B-FCFF912A9892", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDD0A103-6D00-4D3D-9570-2DF74B6FE294", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*", "matchCriteriaId": "33AC4365-576C-487A-89C5-197A26D416C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*", "matchCriteriaId": "84B367AC-E1E1-4BC5-8BF4-D5B517C0CA7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0A9C054-1F82-41DD-BE13-2B71B6F87F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*", "matchCriteriaId": "7CB0781E-D5B5-4576-ABD4-0EE1C0C3DF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*", "matchCriteriaId": "7AE15288-9344-41ED-B574-6DC4A4DDE386", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*", "matchCriteriaId": "84963C1D-06C1-4FBF-A3B8-EB14D2EB43DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*", "matchCriteriaId": "FE848097-01E6-4C9B-9593-282D55CC77D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*", "matchCriteriaId": "08E4028B-72E7-4E4A-AD0F-645F5AACAA29", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "63313ADA-3C52-47C8-9745-6BF6AEF0F6AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*", "matchCriteriaId": "BA646396-7C10-45A0-89A9-C75C5D8AFB3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "476BB487-150A-4482-8C84-E6A2995A97E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*", "matchCriteriaId": "3555324F-40F8-4BF4-BE5F-52A1E22B3AFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*", "matchCriteriaId": "60540FDE-8C31-4679-A85E-614B1EFE1FF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*", "matchCriteriaId": "AE652520-B693-47F1-A342-621C149A7430", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*", "matchCriteriaId": "D0EC3272-8E1E-4415-A254-BB6C7FB49BEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF5AF16-A4F2-4E65-ADA8-DE11BE1F198D", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*", "matchCriteriaId": "F7DF88E7-1A67-447C-BCF8-5C5564002207", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*", "matchCriteriaId": "460A0D6C-3A06-4910-B1E5-375E12F64F6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*", "matchCriteriaId": "950D8316-8117-4C09-A2A9-B34191957D32", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*", "matchCriteriaId": "A5484DE8-3CB1-4591-BF30-0D5E255034E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*", "matchCriteriaId": "CCC09395-A9C7-4D7F-9B55-3120A84CB427", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*", "matchCriteriaId": "F3ACD1B2-F952-46C8-989A-C4744E16D5E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*", "matchCriteriaId": "E91594E8-5320-4B6A-A4D8-17BBF211A96E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*", "matchCriteriaId": "110ED819-CFFD-4DA6-BE13-08CDEFD17ADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*", "matchCriteriaId": "C3FD4968-B784-40D5-A09C-51F303A4C8C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*", "matchCriteriaId": "D8314735-FF59-48CF-898B-95967B2856DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*", "matchCriteriaId": "3F52F734-0C14-4FE6-82C7-038C28383A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*", "matchCriteriaId": "37C2722F-55D0-4390-BCE0-5FCB61549278", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*", "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*", "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*", "matchCriteriaId": "1C2E61C2-6640-43AC-B435-17DD1DD68C47", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*", "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*", "matchCriteriaId": "11AEFEC9-5DB4-44CB-977D-6561DC1680C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "4217DD13-7963-432B-9406-A6F7B94A354B", "versionEndIncluding": "10.3.185.25", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*", "matchCriteriaId": "02EBACEB-1266-4A2C-A47E-066D12EE5B96", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*", "matchCriteriaId": "CA86C5B3-1FC9-4585-9566-862A0318AF2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*", "matchCriteriaId": "3C2A6BBE-6033-4EF2-B890-9BD8867CC65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*", "matchCriteriaId": "33B7290A-8A7E-496D-95C4-DADA2821859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*", "matchCriteriaId": "05D97485-2C56-4B63-B105-BDB44E853210", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*", "matchCriteriaId": "8E007346-F45A-456F-BD0A-F3110A5854FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*", "matchCriteriaId": "4664A826-4DCA-4C73-B550-7C98D24C20A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.185.21:*:*:*:*:*:*:*", "matchCriteriaId": "C6424251-EB56-46A2-8745-E1DA795C7AC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:10.3.185.23:*:*:*:*:*:*:*", "matchCriteriaId": "BB218B3B-C58B-4D7E-9F26-AF40260ABE25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED56AE50-E4D1-468B-9322-9E24563FC4E7", "versionEndIncluding": "2.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*", "matchCriteriaId": "74D6B448-81D1-47F6-B926-89CCC6C0FED6", "versionEndIncluding": "2.7.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "97F0F4B8-A8AE-4AF2-8991-36DF5478AC90", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "51905ABB-C598-415F-9B6C-26963129352A", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C33E3BD1-CFF8-40C5-9247-1BA5D64A0AA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "479BCE0B-6721-4BC4-B5A3-480B69041CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "E76E7759-50B7-4351-AC46-16B02778EDC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F9EBEBFD-9535-4107-B4AB-899DD33E7B12", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB41166-A337-45F8-8F7B-C6FDFC7FF2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "E61C0AF0-6D78-4B38-B319-438C6523CF08", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "89B0FEA7-ECC8-493D-96E3-054C81CC189E", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:adobe_air:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "BA95AEAC-D6C5-4ACB-8712-868C7D784E1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted SWF file, as demonstrated by \"about 400 unique crash signatures.\"" }, { "lang": "es", "value": "Adobe Flash Player anterior a v10.3.183.5 en Windows, Mac OS X, Linux y Solaris, y anterior a v10.3.186.3 en Android, y Adobe AIR anterior a v2.7.1 en Windows y Mac OS X y anterior a v2.7.1.1961 en Android, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un archivo SWF espacialmente manipulado, como lo demuestran los \"cerca de 400 firmas de ca\u00edda\"." } ], "id": "CVE-2011-2424", "lastModified": "2024-11-21T01:28:14.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-08-15T21:55:01.347", "references": [ { "source": "psirt@adobe.com", "url": "http://blogs.adobe.com/asset/2011/08/how-did-you-get-to-that-number.html" }, { "source": "psirt@adobe.com", "url": "http://googleonlinesecurity.blogspot.com/2011/08/fuzzing-at-scale.html" }, { "source": "psirt@adobe.com", "url": "http://twitter.com/taviso/statuses/101046246277521409" }, { "source": "psirt@adobe.com", "url": "http://twitter.com/taviso/statuses/101046396790128640" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html" }, { "source": "psirt@adobe.com", "url": "http://www.redhat.com/support/errata/RHSA-2011-1144.html" }, { "source": "psirt@adobe.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14199" }, { "source": "psirt@adobe.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blogs.adobe.com/asset/2011/08/how-did-you-get-to-that-number.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googleonlinesecurity.blogspot.com/2011/08/fuzzing-at-scale.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://twitter.com/taviso/statuses/101046246277521409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://twitter.com/taviso/statuses/101046396790128640" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-1144.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA11-222A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15869" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.