Vulnerabilities > CVE-2012-0753 - Out-of-bounds Write vulnerability in Adobe Flash Player
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted MP4 data.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family MacOS X Local Security Checks NASL id MACOSX_FLASH_PLAYER_11_1_102_62.NASL description According to its version, the instance of Flash Player installed on the remote Mac OS X host is 10.x equal to or earlier than 10.3.183.14 or 11.x equal to or earlier than 11.1.102.62. It is, therefore, reportedly affected by several critical vulnerabilities : - An unspecified memory corruption issue exists that could lead to code execution. (CVE-2012-0754) - An unspecified type confusion memory corruption vulnerability exists that could lead to code execution. (CVE-2012-0752) - An MP4 parsing memory corruption issue exists that could lead to code execution. (CVE-2012-0753) - Multiple unspecified security bypass vulnerabilities exist that could lead to code execution. (CVE-2012-0755, CVE-2012-0756) - A universal cross-site scripting issue exists that could be used to take actions on a user last seen 2020-06-01 modified 2020-06-02 plugin id 58002 published 2012-02-17 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58002 title Flash Player for Mac <= 10.3.183.14 / 11.1.102.62 Multiple Vulnerabilities (APSB12-03) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(58002); script_version("1.15"); script_cvs_date("Date: 2018/07/14 1:59:35"); script_cve_id( "CVE-2012-0752", "CVE-2012-0753", "CVE-2012-0754", "CVE-2012-0755", "CVE-2012-0756", "CVE-2012-0767" ); script_bugtraq_id( 52032, 52033, 52034, 52035, 52036, 52040 ); script_xref(name:"ZDI", value:"ZDI-12-080"); script_name(english:"Flash Player for Mac <= 10.3.183.14 / 11.1.102.62 Multiple Vulnerabilities (APSB12-03)"); script_summary(english:"Checks version of Flash Player from Info.plist"); script_set_attribute( attribute:"synopsis", value: "The remote Mac OS X host has a browser plugin that is affected by multiple vulnerabilities." ); script_set_attribute( attribute:"description", value: "According to its version, the instance of Flash Player installed on the remote Mac OS X host is 10.x equal to or earlier than 10.3.183.14 or 11.x equal to or earlier than 11.1.102.62. It is, therefore, reportedly affected by several critical vulnerabilities : - An unspecified memory corruption issue exists that could lead to code execution. (CVE-2012-0754) - An unspecified type confusion memory corruption vulnerability exists that could lead to code execution. (CVE-2012-0752) - An MP4 parsing memory corruption issue exists that could lead to code execution. (CVE-2012-0753) - Multiple unspecified security bypass vulnerabilities exist that could lead to code execution. (CVE-2012-0755, CVE-2012-0756) - A universal cross-site scripting issue exists that could be used to take actions on a user's behalf on any website or webmail provider. (CVE-2012-0767)" ); script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-12-080/"); script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2012/Jun/67"); script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb12-03.html"); script_set_attribute(attribute:"solution", value:"Upgrade to Adobe Flash version 10.3.183.15 / 11.1.102.62 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Adobe Flash Player MP4 "cprt" Overflow'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_set_attribute(attribute:"vuln_publication_date", value:"2012/02/15"); script_set_attribute(attribute:"patch_publication_date", value:"2012/02/15"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/02/17"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:flash_player"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc."); script_dependencies("macosx_flash_player_installed.nasl"); script_require_keys("MacOSX/Flash_Player/Version"); exit(0); } include("global_settings.inc"); include("misc_func.inc"); version = get_kb_item_or_exit("MacOSX/Flash_Player/Version"); # nb: we're checking for versions less than *or equal to* the cutoff! tenx_cutoff_version = "10.3.183.14"; tenx_fixed_version = "10.3.183.15"; elevenx_cutoff_version = "11.1.102.55"; elevenx_fixed_version = "11.1.102.62"; fixed_version_for_report = NULL; # 10x if (ver_compare(ver:version, fix:tenx_cutoff_version, strict:FALSE) <= 0) fixed_version_for_report = tenx_fixed_version; # 11x if ( version =~ "^11\." && ver_compare(ver:version, fix:elevenx_cutoff_version, strict:FALSE) <= 0 ) fixed_version_for_report = elevenx_fixed_version; if (!isnull(fixed_version_for_report)) { if (report_verbosity > 0) { report = '\n Installed version : ' + version + '\n Fixed version : '+fixed_version_for_report+'\n'; security_hole(port:0, extra:report); } else security_hole(0); exit(0); } else exit(0, "The Flash Player for Mac "+version+" install is not affected.");
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201204-07.NASL description The remote host is affected by the vulnerability described in GLSA-201204-07 (Adobe Flash Player: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted SWF file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass intended access restrictions, bypass cross-domain policy, inject arbitrary web script, or obtain sensitive information. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 59623 published 2012-06-21 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/59623 title GLSA-201204-07 : Adobe Flash Player: Multiple vulnerabilities code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 201204-07. # # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(59623); script_version("1.14"); script_cvs_date("Date: 2018/07/11 17:09:26"); script_cve_id("CVE-2011-2445", "CVE-2011-2450", "CVE-2011-2451", "CVE-2011-2452", "CVE-2011-2453", "CVE-2011-2454", "CVE-2011-2455", "CVE-2011-2456", "CVE-2011-2457", "CVE-2011-2458", "CVE-2011-2459", "CVE-2011-2460", "CVE-2012-0752", "CVE-2012-0753", "CVE-2012-0754", "CVE-2012-0755", "CVE-2012-0756", "CVE-2012-0767", "CVE-2012-0768", "CVE-2012-0769", "CVE-2012-0773"); script_bugtraq_id(50618, 50619, 50620, 50621, 50622, 50623, 50624, 50625, 50626, 50627, 50628, 50629, 52032, 52033, 52034, 52035, 52036, 52040, 52297, 52299, 52748); script_xref(name:"GLSA", value:"201204-07"); script_name(english:"GLSA-201204-07 : Adobe Flash Player: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-201204-07 (Adobe Flash Player: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted SWF file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass intended access restrictions, bypass cross-domain policy, inject arbitrary web script, or obtain sensitive information. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/201204-07" ); script_set_attribute( attribute:"solution", value: "All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=www-plugins/adobe-flash-11.2.202.228'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Adobe Flash Player MP4 "cprt" Overflow'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:adobe-flash"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2012/04/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/06/21"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"www-plugins/adobe-flash", unaffected:make_list("ge 11.2.202.228"), vulnerable:make_list("lt 11.2.202.228"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Adobe Flash Player"); }
NASL family SuSE Local Security Checks NASL id SUSE_11_FLASH-PLAYER-120216.NASL description flash-player was updated to version 11.1.102.62. It fixes lots of security issues, some already exploited in the wild. Details can be found at : https://www.adobe.com/support/security/bulletins/apsb12-03.html These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. This update also resolves a universal cross-site scripting vulnerability that could be used to take actions on a user last seen 2020-06-05 modified 2012-02-17 plugin id 57996 published 2012-02-17 reporter This script is Copyright (C) 2012-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/57996 title SuSE 11.1 Security Update : flash-player (SAT Patch Number 5817) NASL family MacOS X Local Security Checks NASL id MACOSX_ADOBE_READER_APSB12-08.NASL description The version of Adobe Reader installed on the remote Mac OS X host is prior to 10.1.3 or 9.5.1. It is, therefore, affected by the following vulnerabilities : - An integer overflow condition exists that allows an attacker to execute arbitrary code via a crafted True Type Font (TFF). (CVE-2012-0774) - A memory corruption issue exists in JavaScript handling that allows an attacker to execute arbitrary code. (CVE-2012-0775) - A security bypass vulnerability exists in the Adobe Reader installer that allows an attacker to execute arbitrary code. (CVE-2012-0776) - A memory corruption issue exists in the JavaScript API that allows an attacker to execute arbitrary code or cause a denial of service. (CVE-2012-0777) Note that Nessus has not tested for these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 58684 published 2012-04-11 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58684 title Adobe Reader < 10.1.3 / 9.5.1 Multiple Vulnerabilities (APSB12-03, APSB12-05, APSB12-07, APSB12-08) (Mac OS X) NASL family SuSE Local Security Checks NASL id SUSE_FLASH-PLAYER-7982.NASL description This version upgrade of flash-player fixes multiple security issues that could potentially be exploited to cause a crash or even execute arbitrary code. The following CVE were assigned : CVE-2012-0752 / CVE-2012-0753 / CVE-2012-0754 / CVE-2012-0755 / CVE-2012-0756 / CVE-2012-0767 last seen 2020-06-05 modified 2012-02-27 plugin id 58129 published 2012-02-27 reporter This script is Copyright (C) 2012-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58129 title SuSE 10 Security Update : flash-player (ZYPP Patch Number 7982) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2012-0144.NASL description An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed on the Adobe security page APSB12-03, listed in the References section. Multiple security flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the specially crafted SWF content. (CVE-2012-0752, CVE-2012-0753, CVE-2012-0754, CVE-2012-0755, CVE-2012-0756) A flaw in flash-plugin could allow an attacker to conduct cross-site scripting (XSS) attacks if a victim were tricked into visiting a specially crafted web page. (CVE-2012-0767) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.183.15. last seen 2020-04-16 modified 2012-02-20 plugin id 58027 published 2012-02-20 reporter This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/58027 title RHEL 5 / 6 : flash-plugin (RHSA-2012:0144) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_F63BF080619D11E191AF003067B2972C.NASL description These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. last seen 2020-06-01 modified 2020-06-02 plugin id 58138 published 2012-02-28 reporter This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/58138 title FreeBSD : linux-flashplugin -- multiple vulnerabilities (f63bf080-619d-11e1-91af-003067b2972c) NASL family Windows NASL id FLASH_PLAYER_APSB12-03.NASL description According to its version, the instance of Flash Player installed on the remote Windows host is 10.x equal to or earlier than 10.3.183.14 or 11.x equal to or earlier than 11.1.102.55. It is, therefore, reportedly affected by several critical vulnerabilities : - Multiple unspecified memory corruption issues exist that could lead to code execution. (CVE-2012-0751, CVE-2012-0754) - An unspecified type confusion memory corruption vulnerability exists that could lead to code execution. (CVE-2012-0752) - An MP4 parsing memory corruption issue exists that could lead to code execution. (CVE-2012-0753) - Multiple unspecified security bypass vulnerabilities exist that could lead to code execution. (CVE-2012-0755, CVE-2012-0756) - A universal cross-site scripting issue exists that could be used to take actions on a user last seen 2020-06-01 modified 2020-06-02 plugin id 58001 published 2012-02-17 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58001 title Flash Player <= 10.3.183.14 / 11.1.102.55 Multiple Vulnerabilities (APSB12-03) NASL family SuSE Local Security Checks NASL id OPENSUSE-2012-98.NASL description - Update to 11.1.102.62: (bnc#747297) https://www.adobe.com/support/security/bulletins/apsb12- 03.html CVEs fixed: CVE-2012-0751, CVE-2012-0752, CVE-2012-0753, CVE-2012-0754, CVE-2012-0755, CVE-2012-0756, CVE-2012-0767 last seen 2020-06-05 modified 2014-06-13 plugin id 74858 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/74858 title openSUSE Security Update : flash-player (openSUSE-2012-98) NASL family SuSE Local Security Checks NASL id SUSE_11_4_FLASH-PLAYER-120216.NASL description flash-player was updated to the security update to 11.1.102.62. It fixes lots of security issues, some already exploited in the wild. Details can be found on: https://www.adobe.com/support/security/bulletins/apsb12-03.h tml These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. This update also resolves a universal cross-site scripting vulnerability that could be used to take actions on a user last seen 2020-06-05 modified 2014-06-13 plugin id 75841 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/75841 title openSUSE Security Update : flash-player (openSUSE-SU-2012:0265-1)
Oval
accepted 2015-08-03T04:00:52.062-04:00 class vulnerability contributors name Scott Quint organization DTCC name Josh Turpin organization Symantec Corporation name Shane Shaffer organization G2, Inc. name Shane Shaffer organization G2, Inc. name Maria Kedovskaya organization ALTX-SOFT name Maria Kedovskaya organization ALTX-SOFT name Maria Kedovskaya organization ALTX-SOFT name Maria Kedovskaya organization ALTX-SOFT name Maria Kedovskaya organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT name Evgeniy Pavlov organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT
definition_extensions comment Adobe Flash Player 10 is installed oval oval:org.mitre.oval:def:7610 comment Adobe Flash Player 9 is installed oval oval:org.mitre.oval:def:7402 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player 11 is installed oval oval:org.mitre.oval:def:13071 comment ActiveX Control is installed oval oval:org.mitre.oval:def:26707
description Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted MP4 data. family windows id oval:org.mitre.oval:def:14795 status accepted submitted 2012-02-22T08:21:33.000-05:00 title Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted MP4 data. version 76 accepted 2013-02-04T04:00:09.425-05:00 class vulnerability contributors name Shane Shaffer organization G2, Inc. definition_extensions comment Adobe Flash Player is Installed oval oval:org.mitre.oval:def:12319 comment Adobe Flash Player 11 is installed oval oval:org.mitre.oval:def:16112
description Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted MP4 data. family macos id oval:org.mitre.oval:def:15601 status accepted submitted 2012-12-20T15:35:55.661-05:00 title Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted MP4 data. version 4
Redhat
advisories |
| ||||
rpms |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 52032 CVE ID: CVE-2012-0752,CVE-2012-0753,CVE-2012-0754 Adobe Flash Player是一个集成的多媒体播放器。 Adobe Flash Player在实现上存在远程内存破坏漏洞,攻击者可利用此漏洞执行任意代码 0 Adobe Flash Player 11.x Adobe Flash Player 10.x 厂商补丁: Adobe ----- Adobe已经为此发布了一个安全公告(apsb12-03)以及相应补丁: apsb12-03:Security update available for Adobe Flash Player 链接:http://www.adobe.com/support/security/bulletins/apsb12-03.html |
id | SSV:30127 |
last seen | 2017-11-19 |
modified | 2012-02-16 |
published | 2012-02-16 |
reporter | Root |
title | Adobe Flash Player远程内存破坏漏洞(CVE-2012-0752) |
References
- http://www.adobe.com/support/security/bulletins/apsb12-03.html
- http://rhn.redhat.com/errata/RHSA-2012-0144.html
- http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html
- http://security.gentoo.org/glsa/glsa-201204-07.xml
- http://secunia.com/advisories/48819
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15601
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14795
- http://secunia.com/advisories/48265