Vulnerabilities > CVE-2012-0754 - Out-of-bounds Write vulnerability in Adobe Flash Player
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Exploit-Db
description | Name' => "Adobe Flash Player .mp4 'cprt' Overflow". CVE-2012-0754. Remote exploit for windows platform |
id | EDB-ID:18572 |
last seen | 2016-02-02 |
modified | 2012-03-08 |
published | 2012-03-08 |
reporter | metasploit |
source | https://www.exploit-db.com/download/18572/ |
title | Adobe Flash Player .mp4 - 'cprt' Overflow" |
Metasploit
description | This module exploits a vulnerability found in Adobe Flash Player. By supplying a corrupt .mp4 file loaded by Flash, it is possible to gain arbitrary remote code execution under the context of the user. This vulnerability has been exploited in the wild as part of the "Iran's Oil and Nuclear Situation.doc" e-mail attack. According to the advisory, 10.3.183.15 and 11.x before 11.1.102.62 are affected. |
id | MSF:EXPLOIT/WINDOWS/BROWSER/ADOBE_FLASH_MP4_CPRT |
last seen | 2020-06-04 |
modified | 2017-10-05 |
published | 2012-03-08 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/adobe_flash_mp4_cprt.rb |
title | Adobe Flash Player MP4 'cprt' Overflow |
Nessus
NASL family MacOS X Local Security Checks NASL id MACOSX_FLASH_PLAYER_11_1_102_62.NASL description According to its version, the instance of Flash Player installed on the remote Mac OS X host is 10.x equal to or earlier than 10.3.183.14 or 11.x equal to or earlier than 11.1.102.62. It is, therefore, reportedly affected by several critical vulnerabilities : - An unspecified memory corruption issue exists that could lead to code execution. (CVE-2012-0754) - An unspecified type confusion memory corruption vulnerability exists that could lead to code execution. (CVE-2012-0752) - An MP4 parsing memory corruption issue exists that could lead to code execution. (CVE-2012-0753) - Multiple unspecified security bypass vulnerabilities exist that could lead to code execution. (CVE-2012-0755, CVE-2012-0756) - A universal cross-site scripting issue exists that could be used to take actions on a user last seen 2020-06-01 modified 2020-06-02 plugin id 58002 published 2012-02-17 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58002 title Flash Player for Mac <= 10.3.183.14 / 11.1.102.62 Multiple Vulnerabilities (APSB12-03) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(58002); script_version("1.15"); script_cvs_date("Date: 2018/07/14 1:59:35"); script_cve_id( "CVE-2012-0752", "CVE-2012-0753", "CVE-2012-0754", "CVE-2012-0755", "CVE-2012-0756", "CVE-2012-0767" ); script_bugtraq_id( 52032, 52033, 52034, 52035, 52036, 52040 ); script_xref(name:"ZDI", value:"ZDI-12-080"); script_name(english:"Flash Player for Mac <= 10.3.183.14 / 11.1.102.62 Multiple Vulnerabilities (APSB12-03)"); script_summary(english:"Checks version of Flash Player from Info.plist"); script_set_attribute( attribute:"synopsis", value: "The remote Mac OS X host has a browser plugin that is affected by multiple vulnerabilities." ); script_set_attribute( attribute:"description", value: "According to its version, the instance of Flash Player installed on the remote Mac OS X host is 10.x equal to or earlier than 10.3.183.14 or 11.x equal to or earlier than 11.1.102.62. It is, therefore, reportedly affected by several critical vulnerabilities : - An unspecified memory corruption issue exists that could lead to code execution. (CVE-2012-0754) - An unspecified type confusion memory corruption vulnerability exists that could lead to code execution. (CVE-2012-0752) - An MP4 parsing memory corruption issue exists that could lead to code execution. (CVE-2012-0753) - Multiple unspecified security bypass vulnerabilities exist that could lead to code execution. (CVE-2012-0755, CVE-2012-0756) - A universal cross-site scripting issue exists that could be used to take actions on a user's behalf on any website or webmail provider. (CVE-2012-0767)" ); script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-12-080/"); script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2012/Jun/67"); script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb12-03.html"); script_set_attribute(attribute:"solution", value:"Upgrade to Adobe Flash version 10.3.183.15 / 11.1.102.62 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Adobe Flash Player MP4 "cprt" Overflow'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_set_attribute(attribute:"vuln_publication_date", value:"2012/02/15"); script_set_attribute(attribute:"patch_publication_date", value:"2012/02/15"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/02/17"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:flash_player"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc."); script_dependencies("macosx_flash_player_installed.nasl"); script_require_keys("MacOSX/Flash_Player/Version"); exit(0); } include("global_settings.inc"); include("misc_func.inc"); version = get_kb_item_or_exit("MacOSX/Flash_Player/Version"); # nb: we're checking for versions less than *or equal to* the cutoff! tenx_cutoff_version = "10.3.183.14"; tenx_fixed_version = "10.3.183.15"; elevenx_cutoff_version = "11.1.102.55"; elevenx_fixed_version = "11.1.102.62"; fixed_version_for_report = NULL; # 10x if (ver_compare(ver:version, fix:tenx_cutoff_version, strict:FALSE) <= 0) fixed_version_for_report = tenx_fixed_version; # 11x if ( version =~ "^11\." && ver_compare(ver:version, fix:elevenx_cutoff_version, strict:FALSE) <= 0 ) fixed_version_for_report = elevenx_fixed_version; if (!isnull(fixed_version_for_report)) { if (report_verbosity > 0) { report = '\n Installed version : ' + version + '\n Fixed version : '+fixed_version_for_report+'\n'; security_hole(port:0, extra:report); } else security_hole(0); exit(0); } else exit(0, "The Flash Player for Mac "+version+" install is not affected.");
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201204-07.NASL description The remote host is affected by the vulnerability described in GLSA-201204-07 (Adobe Flash Player: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted SWF file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass intended access restrictions, bypass cross-domain policy, inject arbitrary web script, or obtain sensitive information. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 59623 published 2012-06-21 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/59623 title GLSA-201204-07 : Adobe Flash Player: Multiple vulnerabilities code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 201204-07. # # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(59623); script_version("1.14"); script_cvs_date("Date: 2018/07/11 17:09:26"); script_cve_id("CVE-2011-2445", "CVE-2011-2450", "CVE-2011-2451", "CVE-2011-2452", "CVE-2011-2453", "CVE-2011-2454", "CVE-2011-2455", "CVE-2011-2456", "CVE-2011-2457", "CVE-2011-2458", "CVE-2011-2459", "CVE-2011-2460", "CVE-2012-0752", "CVE-2012-0753", "CVE-2012-0754", "CVE-2012-0755", "CVE-2012-0756", "CVE-2012-0767", "CVE-2012-0768", "CVE-2012-0769", "CVE-2012-0773"); script_bugtraq_id(50618, 50619, 50620, 50621, 50622, 50623, 50624, 50625, 50626, 50627, 50628, 50629, 52032, 52033, 52034, 52035, 52036, 52040, 52297, 52299, 52748); script_xref(name:"GLSA", value:"201204-07"); script_name(english:"GLSA-201204-07 : Adobe Flash Player: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-201204-07 (Adobe Flash Player: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted SWF file, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass intended access restrictions, bypass cross-domain policy, inject arbitrary web script, or obtain sensitive information. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/201204-07" ); script_set_attribute( attribute:"solution", value: "All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=www-plugins/adobe-flash-11.2.202.228'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Adobe Flash Player MP4 "cprt" Overflow'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:adobe-flash"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2012/04/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/06/21"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2018 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"www-plugins/adobe-flash", unaffected:make_list("ge 11.2.202.228"), vulnerable:make_list("lt 11.2.202.228"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Adobe Flash Player"); }
NASL family SuSE Local Security Checks NASL id SUSE_11_FLASH-PLAYER-120216.NASL description flash-player was updated to version 11.1.102.62. It fixes lots of security issues, some already exploited in the wild. Details can be found at : https://www.adobe.com/support/security/bulletins/apsb12-03.html These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. This update also resolves a universal cross-site scripting vulnerability that could be used to take actions on a user last seen 2020-06-05 modified 2012-02-17 plugin id 57996 published 2012-02-17 reporter This script is Copyright (C) 2012-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/57996 title SuSE 11.1 Security Update : flash-player (SAT Patch Number 5817) NASL family MacOS X Local Security Checks NASL id MACOSX_ADOBE_READER_APSB12-08.NASL description The version of Adobe Reader installed on the remote Mac OS X host is prior to 10.1.3 or 9.5.1. It is, therefore, affected by the following vulnerabilities : - An integer overflow condition exists that allows an attacker to execute arbitrary code via a crafted True Type Font (TFF). (CVE-2012-0774) - A memory corruption issue exists in JavaScript handling that allows an attacker to execute arbitrary code. (CVE-2012-0775) - A security bypass vulnerability exists in the Adobe Reader installer that allows an attacker to execute arbitrary code. (CVE-2012-0776) - A memory corruption issue exists in the JavaScript API that allows an attacker to execute arbitrary code or cause a denial of service. (CVE-2012-0777) Note that Nessus has not tested for these issues but has instead relied only on the application last seen 2020-06-01 modified 2020-06-02 plugin id 58684 published 2012-04-11 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58684 title Adobe Reader < 10.1.3 / 9.5.1 Multiple Vulnerabilities (APSB12-03, APSB12-05, APSB12-07, APSB12-08) (Mac OS X) NASL family SuSE Local Security Checks NASL id SUSE_FLASH-PLAYER-7982.NASL description This version upgrade of flash-player fixes multiple security issues that could potentially be exploited to cause a crash or even execute arbitrary code. The following CVE were assigned : CVE-2012-0752 / CVE-2012-0753 / CVE-2012-0754 / CVE-2012-0755 / CVE-2012-0756 / CVE-2012-0767 last seen 2020-06-05 modified 2012-02-27 plugin id 58129 published 2012-02-27 reporter This script is Copyright (C) 2012-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58129 title SuSE 10 Security Update : flash-player (ZYPP Patch Number 7982) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2012-0144.NASL description An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed on the Adobe security page APSB12-03, listed in the References section. Multiple security flaws were found in the way flash-plugin displayed certain SWF content. An attacker could use these flaws to create a specially crafted SWF file that would cause flash-plugin to crash or, potentially, execute arbitrary code when the victim loaded a page containing the specially crafted SWF content. (CVE-2012-0752, CVE-2012-0753, CVE-2012-0754, CVE-2012-0755, CVE-2012-0756) A flaw in flash-plugin could allow an attacker to conduct cross-site scripting (XSS) attacks if a victim were tricked into visiting a specially crafted web page. (CVE-2012-0767) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.3.183.15. last seen 2020-04-16 modified 2012-02-20 plugin id 58027 published 2012-02-20 reporter This script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/58027 title RHEL 5 / 6 : flash-plugin (RHSA-2012:0144) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_F63BF080619D11E191AF003067B2972C.NASL description These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. last seen 2020-06-01 modified 2020-06-02 plugin id 58138 published 2012-02-28 reporter This script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/58138 title FreeBSD : linux-flashplugin -- multiple vulnerabilities (f63bf080-619d-11e1-91af-003067b2972c) NASL family Windows NASL id FLASH_PLAYER_APSB12-03.NASL description According to its version, the instance of Flash Player installed on the remote Windows host is 10.x equal to or earlier than 10.3.183.14 or 11.x equal to or earlier than 11.1.102.55. It is, therefore, reportedly affected by several critical vulnerabilities : - Multiple unspecified memory corruption issues exist that could lead to code execution. (CVE-2012-0751, CVE-2012-0754) - An unspecified type confusion memory corruption vulnerability exists that could lead to code execution. (CVE-2012-0752) - An MP4 parsing memory corruption issue exists that could lead to code execution. (CVE-2012-0753) - Multiple unspecified security bypass vulnerabilities exist that could lead to code execution. (CVE-2012-0755, CVE-2012-0756) - A universal cross-site scripting issue exists that could be used to take actions on a user last seen 2020-06-01 modified 2020-06-02 plugin id 58001 published 2012-02-17 reporter This script is Copyright (C) 2012-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/58001 title Flash Player <= 10.3.183.14 / 11.1.102.55 Multiple Vulnerabilities (APSB12-03) NASL family SuSE Local Security Checks NASL id OPENSUSE-2012-98.NASL description - Update to 11.1.102.62: (bnc#747297) https://www.adobe.com/support/security/bulletins/apsb12- 03.html CVEs fixed: CVE-2012-0751, CVE-2012-0752, CVE-2012-0753, CVE-2012-0754, CVE-2012-0755, CVE-2012-0756, CVE-2012-0767 last seen 2020-06-05 modified 2014-06-13 plugin id 74858 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/74858 title openSUSE Security Update : flash-player (openSUSE-2012-98) NASL family SuSE Local Security Checks NASL id SUSE_11_4_FLASH-PLAYER-120216.NASL description flash-player was updated to the security update to 11.1.102.62. It fixes lots of security issues, some already exploited in the wild. Details can be found on: https://www.adobe.com/support/security/bulletins/apsb12-03.h tml These vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system. This update also resolves a universal cross-site scripting vulnerability that could be used to take actions on a user last seen 2020-06-05 modified 2014-06-13 plugin id 75841 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/75841 title openSUSE Security Update : flash-player (openSUSE-SU-2012:0265-1)
Oval
accepted 2015-08-03T04:00:54.788-04:00 class vulnerability contributors name Aharon Chernin organization DTCC name Josh Turpin organization Symantec Corporation name Shane Shaffer organization G2, Inc. name Shane Shaffer organization G2, Inc. name Maria Kedovskaya organization ALTX-SOFT name Maria Kedovskaya organization ALTX-SOFT name Maria Kedovskaya organization ALTX-SOFT name Maria Kedovskaya organization ALTX-SOFT name Maria Kedovskaya organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT name Evgeniy Pavlov organization ALTX-SOFT name Maria Mikhno organization ALTX-SOFT
definition_extensions comment Adobe Flash Player 10 is installed oval oval:org.mitre.oval:def:7610 comment Adobe Flash Player 9 is installed oval oval:org.mitre.oval:def:7402 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player is installed oval oval:org.mitre.oval:def:6700 comment Adobe Flash Player 11 is installed oval oval:org.mitre.oval:def:13071 comment ActiveX Control is installed oval oval:org.mitre.oval:def:26707
description Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. family windows id oval:org.mitre.oval:def:15030 status accepted submitted 2012-02-22T08:21:39.000-05:00 title Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. version 76 accepted 2013-02-04T04:00:25.702-05:00 class vulnerability contributors name Shane Shaffer organization G2, Inc. definition_extensions comment Adobe Flash Player is Installed oval oval:org.mitre.oval:def:12319 comment Adobe Flash Player 11 is installed oval oval:org.mitre.oval:def:16112
description Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. family macos id oval:org.mitre.oval:def:15973 status accepted submitted 2012-12-20T15:35:55.661-05:00 title Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. version 4
Packetstorm
data source | https://packetstormsecurity.com/files/download/110559/adobe_flash_mp4_cprt.rb.txt |
id | PACKETSTORM:110559 |
last seen | 2016-12-05 |
published | 2012-03-08 |
reporter | sinn3r |
source | https://packetstormsecurity.com/files/110559/Adobe-Flash-Player-.mp4-cprt-Overflow.html |
title | Adobe Flash Player .mp4 'cprt' Overflow |
Redhat
advisories |
| ||||
rpms |
|
Saint
bid | 52034 |
description | Adobe Flash Player MP4 Copyright Statement Overflow |
id | misc_flash |
osvdb | 79300 |
title | flash_mp4_cprt_overflow |
type | client |
Seebug
bulletinFamily exploit description BUGTRAQ ID: 52032 CVE ID: CVE-2012-0752,CVE-2012-0753,CVE-2012-0754 Adobe Flash Player是一个集成的多媒体播放器。 Adobe Flash Player在实现上存在远程内存破坏漏洞,攻击者可利用此漏洞执行任意代码 0 Adobe Flash Player 11.x Adobe Flash Player 10.x 厂商补丁: Adobe ----- Adobe已经为此发布了一个安全公告(apsb12-03)以及相应补丁: apsb12-03:Security update available for Adobe Flash Player 链接:http://www.adobe.com/support/security/bulletins/apsb12-03.html id SSV:30127 last seen 2017-11-19 modified 2012-02-16 published 2012-02-16 reporter Root title Adobe Flash Player远程内存破坏漏洞(CVE-2012-0752) bulletinFamily exploit description No description provided by source. id SSV:72652 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-72652 title Adobe Flash Player .mp4 'cprt' Overflow"
References
- http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00014.html
- http://rhn.redhat.com/errata/RHSA-2012-0144.html
- http://rhn.redhat.com/errata/RHSA-2012-0144.html
- http://secunia.com/advisories/48265
- http://secunia.com/advisories/48265
- http://secunia.com/advisories/48819
- http://secunia.com/advisories/48819
- http://security.gentoo.org/glsa/glsa-201204-07.xml
- http://security.gentoo.org/glsa/glsa-201204-07.xml
- http://www.adobe.com/support/security/bulletins/apsb12-03.html
- http://www.adobe.com/support/security/bulletins/apsb12-03.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15030
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15030
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15973
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15973