Vulnerabilities > CVE-2014-0498 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Flash Player
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Stack-based buffer overflow in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows attackers to execute arbitrary code via unspecified vectors.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Buffer Overflow via Environment Variables This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
- Overflow Buffers Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
- Client-side Injection-induced Buffer Overflow This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
- Filter Failure through Buffer Overflow In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
- MIME Conversion An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
Nessus
NASL family MacOS X Local Security Checks NASL id MACOSX_FLASH_PLAYER_12_0_0_70.NASL description According to its version, the instance of Flash Player installed on the remote Mac OS X host is equal or prior to 11.7.700.261 / 11.8.x / 11.9.x / 12.0.0.44. It is, therefore, potentially affected by multiple vulnerabilities : - A stack overflow vulnerability exists that could result in arbitrary code execution. (CVE-2014-0498) - A memory leak vulnerability exists that could be used to aid in buffer overflow attacks by bypassing address space layout randomization (ASLR). (CVE-2014-0499) - A double free vulnerability exists that could result in arbitrary code execution. (CVE-2014-0502) last seen 2020-06-01 modified 2020-06-02 plugin id 72607 published 2014-02-20 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/72607 title Flash Player for Mac <= 11.7.700.261 / 12.0.0.44 Multiple Vulnerabilities (APSB14-07) (Mac OS X) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(72607); script_version("1.11"); script_cvs_date("Date: 2019/11/26"); script_cve_id("CVE-2014-0498", "CVE-2014-0499", "CVE-2014-0502"); script_bugtraq_id(65702, 65703, 65704); script_name(english:"Flash Player for Mac <= 11.7.700.261 / 12.0.0.44 Multiple Vulnerabilities (APSB14-07) (Mac OS X)"); script_summary(english:"Checks version of Flash Player"); script_set_attribute(attribute:"synopsis", value: "The remote Mac OS X host has a browser plugin that is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "According to its version, the instance of Flash Player installed on the remote Mac OS X host is equal or prior to 11.7.700.261 / 11.8.x / 11.9.x / 12.0.0.44. It is, therefore, potentially affected by multiple vulnerabilities : - A stack overflow vulnerability exists that could result in arbitrary code execution. (CVE-2014-0498) - A memory leak vulnerability exists that could be used to aid in buffer overflow attacks by bypassing address space layout randomization (ASLR). (CVE-2014-0499) - A double free vulnerability exists that could result in arbitrary code execution. (CVE-2014-0502)"); script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-14-040/"); script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/flash-player/apsb14-07.html"); script_set_attribute(attribute:"solution", value: "Upgrade to Adobe Flash Player version 11.7.700.269 / 12.0.0.70 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0502"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2014/02/20"); script_set_attribute(attribute:"patch_publication_date", value:"2014/02/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/20"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:flash_player"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("macosx_flash_player_installed.nasl"); script_require_keys("MacOSX/Flash_Player/Version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); version = get_kb_item_or_exit("MacOSX/Flash_Player/Version"); path = get_kb_item_or_exit("MacOSX/Flash_Player/Path"); # nb: we're checking for versions less than *or equal to* the cutoff! extended_cutoff_version = "11.7.700.261"; extended_fixed_version = "11.7.700.269"; standard_cutoff_version = "12.0.0.44"; standard_fixed_version = "12.0.0.70"; fixed_version_for_report = NULL; if (version =~ "^([0-9]|10)\.|^11\.[0-6]") fixed_version_for_report = extended_fixed_version; else if ( version =~ "^11\.7\." && ver_compare(ver:version, fix:extended_cutoff_version, strict:FALSE) <= 0 ) fixed_version_for_report = extended_fixed_version; else if (version =~ "^11\.[89]\.") fixed_version_for_report = standard_fixed_version; else if ( version =~ "^12\.0\.0\." && ver_compare(ver:version, fix:standard_cutoff_version, strict:FALSE) <= 0 ) fixed_version_for_report = standard_fixed_version; if (!isnull(fixed_version_for_report)) { if (report_verbosity > 0) { report = '\n Path : ' + path + '\n Installed version : ' + version + '\n Fixed version : ' + fixed_version_for_report + '\n'; security_hole(port:0, extra:report); } else security_hole(0); exit(0); } else audit(AUDIT_INST_PATH_NOT_VULN, "Flash Player for Mac", version, path);
NASL family Windows NASL id FLASH_PLAYER_APSB14-07.NASL description According to its version, the instance of Flash Player installed on the remote Windows host is equal or prior to 11.7.700.261 / 11.8.x / 11.9.x / 12.0.0.70. It is, therefore, potentially affected multiple vulnerabilities : - A stack overflow vulnerability exists that could result in arbitrary code execution. (CVE-2014-0498) - A memory leak vulnerability exists that could be used to aid in buffer overflow attacks by bypassing address space layout randomization (ASLR). (CVE-2014-0499) - A double free vulnerability exists that could result in arbitrary code execution. (CVE-2014-0502) last seen 2020-06-01 modified 2020-06-02 plugin id 72606 published 2014-02-20 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/72606 title Flash Player <= 11.7.700.261 / 12.0.0.44 Multiple Vulnerabilities (APSB14-07) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(72606); script_version("1.13"); script_cvs_date("Date: 2019/11/26"); script_cve_id("CVE-2014-0498", "CVE-2014-0499", "CVE-2014-0502"); script_bugtraq_id(65702, 65703, 65704); script_name(english:"Flash Player <= 11.7.700.261 / 12.0.0.44 Multiple Vulnerabilities (APSB14-07)"); script_summary(english:"Checks version of Flash Player"); script_set_attribute(attribute:"synopsis", value: "The remote Windows host has a browser plugin that is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "According to its version, the instance of Flash Player installed on the remote Windows host is equal or prior to 11.7.700.261 / 11.8.x / 11.9.x / 12.0.0.70. It is, therefore, potentially affected multiple vulnerabilities : - A stack overflow vulnerability exists that could result in arbitrary code execution. (CVE-2014-0498) - A memory leak vulnerability exists that could be used to aid in buffer overflow attacks by bypassing address space layout randomization (ASLR). (CVE-2014-0499) - A double free vulnerability exists that could result in arbitrary code execution. (CVE-2014-0502)"); script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-14-040/"); script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/flash-player/apsb14-07.html"); script_set_attribute(attribute:"solution", value: "Upgrade to Adobe Flash Player version 11.7.700.269 / 12.0.0.70 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0502"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2014/02/20"); script_set_attribute(attribute:"patch_publication_date", value:"2014/02/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/20"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:flash_player"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("flash_player_installed.nasl"); script_require_keys("SMB/Flash_Player/installed"); exit(0); } include("global_settings.inc"); include("misc_func.inc"); get_kb_item_or_exit("SMB/Flash_Player/installed"); # Identify vulnerable versions. info = ""; # we're checking for versions less than *or equal to* the cutoff! foreach variant (make_list("Plugin", "ActiveX", "Chrome", "Chrome_Pepper")) { vers = get_kb_list("SMB/Flash_Player/"+variant+"/Version/*"); files = get_kb_list("SMB/Flash_Player/"+variant+"/File/*"); if (!isnull(vers) && !isnull(files)) { foreach key (keys(vers)) { ver = vers[key]; if (ver) { iver = split(ver, sep:'.', keep:FALSE); for (i=0; i<max_index(iver); i++) iver[i] = int(iver[i]); if ( ( # Chrome Flash <= 12.0.0.44 variant == "Chrome_Pepper" && (iver[0] == 12 && iver[1] == 0 && iver[2] == 0 && iver[3] <= 44) ) || (variant != "Chrome_Pepper" && ( # < 11 iver[0] < 11 || # 11.x <= 11.7.700.261 ( iver[0] == 11 && ( iver[1] < 7 || ( iver[1] == 7 && ( iver[2] < 700 || (iver[2] == 700 && iver[3] <= 261) ) ) ) ) || # 11.8.x (iver[0] == 11 && iver[1] == 8) || # 11.9.x (iver[0] == 11 && iver[1] == 9) || # 12.0.0.x <= 12.0.0.44 ( iver[0] == 12 && ( iver[1] == 0 && ( iver[2] == 0 && ( iver[3] <= 44 ) ) ) ) ) ) ) { num = key - ("SMB/Flash_Player/"+variant+"/Version/"); file = files["SMB/Flash_Player/"+variant+"/File/"+num]; if (variant == "Plugin") { info += '\n Product: Browser Plugin (for Firefox / Netscape / Opera)'; } else if (variant == "ActiveX") { info += '\n Product : ActiveX control (for Internet Explorer)'; } else if ("Chrome" >< variant) { info += '\n Product : Browser Plugin (for Google Chrome)'; } info += '\n Path : ' + file + '\n Installed version : ' + ver; if (variant == "Chrome_Pepper") info += '\n Fixed version : 12.0.0.70 (Chrome PepperFlash)'; else { if (ver =~ "^11\.7") fix = "11.7.700.269"; else fix = "12.0.0.70"; info += '\n Fixed version : '+fix; } info += '\n'; } } } } } if (info) { port = get_kb_item("SMB/transport"); if (!port) port = 445; if (report_verbosity > 0) security_hole(port:port, extra:info); else security_hole(port); } else { if (thorough_tests) exit(0, 'No vulnerable versions of Adobe Flash Player were found.'); else exit(1, 'Google Chrome\'s built-in Flash Player may not have been detected because the \'Perform thorough tests\' setting was not enabled.'); }
NASL family Windows NASL id SMB_KB2934802.NASL description The remote host is missing KB2929825. It is, therefore, affected by multiple vulnerabilities : - A stack overflow vulnerability exists that could result in arbitrary code execution. (CVE-2014-0498) - A memory leak vulnerability exists that could be used to aid in buffer overflow attacks by bypassing address space layout randomization (ASLR). (CVE-2014-0499) - A double free vulnerability exists that could result in arbitrary code execution. (CVE-2014-0502) last seen 2020-06-01 modified 2020-06-02 plugin id 72608 published 2014-02-20 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/72608 title MS KB2934802: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(72608); script_version("1.13"); script_cvs_date("Date: 2019/11/26"); script_cve_id("CVE-2014-0498", "CVE-2014-0499", "CVE-2014-0502"); script_bugtraq_id(65702, 65703, 65704); script_xref(name:"MSKB", value:"2934802"); script_name(english:"MS KB2934802: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer"); script_summary(english:"Checks version of ActiveX control"); script_set_attribute(attribute:"synopsis", value: "The remote host has an ActiveX control installed that is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The remote host is missing KB2929825. It is, therefore, affected by multiple vulnerabilities : - A stack overflow vulnerability exists that could result in arbitrary code execution. (CVE-2014-0498) - A memory leak vulnerability exists that could be used to aid in buffer overflow attacks by bypassing address space layout randomization (ASLR). (CVE-2014-0499) - A double free vulnerability exists that could result in arbitrary code execution. (CVE-2014-0502)"); script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-14-040/"); script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/flash-player/apsb14-07.html"); script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityAdvisories/2016/2755801"); script_set_attribute(attribute:"see_also", value:"https://support.microsoft.com/en-us/help/2934802/microsoft-security-advisory-update-for-vulnerabilities-in-adobe-flash"); script_set_attribute(attribute:"solution", value: "Install Microsoft KB2934802."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2014-0502"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2014/02/20"); script_set_attribute(attribute:"patch_publication_date", value:"2014/02/20"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/02/20"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows"); script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:flash_player"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("smb_hotfixes.nasl"); script_require_keys("SMB/Registry/Enumerated", "SMB/WindowsVersion", "SMB/ProductName"); script_require_ports(139, 445); exit(0); } include("audit.inc"); include("smb_func.inc"); include("smb_hotfixes.inc"); include("smb_hotfixes_fcheck.inc"); include("smb_activex_func.inc"); include("misc_func.inc"); get_kb_item_or_exit("SMB/Registry/Enumerated"); get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1); if (hotfix_check_sp_range(win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN); if (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE); if (activex_init() != ACX_OK) audit(AUDIT_FN_FAIL, "activex_init()"); # Adobe Flash Player CLSID clsid = '{D27CDB6E-AE6D-11cf-96B8-444553540000}'; file = activex_get_filename(clsid:clsid); if (isnull(file)) { activex_end(); audit(AUDIT_FN_FAIL, "activex_get_filename", "NULL"); } if (!file) { activex_end(); audit(AUDIT_ACTIVEX_NOT_FOUND, clsid); } # Get its version. version = activex_get_fileversion(clsid:clsid); if (!version) { activex_end(); audit(AUDIT_VER_FAIL, file); } info = ''; iver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(iver); i++) iver[i] = int(iver[i]); # < 12.0.0.70 if ( (report_paranoia > 1 || activex_get_killbit(clsid:clsid) == 0) && ( iver[0] < 12 || ( iver[0] == 12 && ( (iver[1] == 0 && iver[2] == 0 && iver[3] < 70) ) ) ) ) { info = '\n Path : ' + file + '\n Installed version : ' + version + '\n Fixed version : 12.0.0.70\n'; } port = kb_smb_transport(); if (info != '') { if (report_verbosity > 0) { if (report_paranoia > 1) { report = info + '\n' + 'Note, though, that Nessus did not check whether the kill bit was\n' + "set for the control's CLSID because of the Report Paranoia setting" + '\n' + 'in effect when this scan was run.\n'; } else { report = info + '\n' + 'Moreover, its kill bit is not set so it is accessible via Internet\n' + 'Explorer.\n'; } security_hole(port:port, extra:report); } else security_hole(port); } else audit(AUDIT_HOST_NOT, 'affected');
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201405-04.NASL description The remote host is affected by the vulnerability described in GLSA-201405-04 (Adobe Flash Player: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted SWF file using Adobe Flash Player, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass the Same Origin Policy or read the clipboard via unspecified vectors. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 73860 published 2014-05-05 reporter This script is Copyright (C) 2014-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/73860 title GLSA-201405-04 : Adobe Flash Player: Multiple vulnerabilities code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 201405-04. # # The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(73860); script_version("1.13"); script_cvs_date("Date: 2018/07/12 19:01:15"); script_cve_id("CVE-2014-0498", "CVE-2014-0499", "CVE-2014-0502", "CVE-2014-0503", "CVE-2014-0504", "CVE-2014-0506", "CVE-2014-0507", "CVE-2014-0508", "CVE-2014-0509", "CVE-2014-0515"); script_bugtraq_id(65702, 65703, 65704, 66122, 66127, 66208, 66699, 66701, 66703, 67092); script_xref(name:"GLSA", value:"201405-04"); script_name(english:"GLSA-201405-04 : Adobe Flash Player: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-201405-04 (Adobe Flash Player: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could entice a user to open a specially crafted SWF file using Adobe Flash Player, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass the Same Origin Policy or read the clipboard via unspecified vectors. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/201405-04" ); script_set_attribute( attribute:"solution", value: "All Adobe Flash Player users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=www-plugins/adobe-flash-11.2.202.356'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Adobe Flash Player Shader Buffer Overflow'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:adobe-flash"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2014/05/03"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/05/05"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"www-plugins/adobe-flash", unaffected:make_list("ge 11.2.202.356"), vulnerable:make_list("lt 11.2.202.356"))) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get()); else security_hole(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "Adobe Flash Player"); }
NASL family SuSE Local Security Checks NASL id OPENSUSE-2014-157.NASL description Adobe Flash Player was updated to 11.2.202.341: (bnc#865021) - APSB14-07, CVE-2014-0498 CVE-2014-0499 CVE-2014-0502 - Contents of flashplayer_11_sa.i386.tar.gz changed back: spec file updated, supplementary script (update.sh) updated. last seen 2020-06-05 modified 2014-06-13 plugin id 75267 published 2014-06-13 reporter This script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/75267 title openSUSE Security Update : flash-player (openSUSE-SU-2014:0277-1) NASL family SuSE Local Security Checks NASL id SUSE_11_FLASH-PLAYER-140224.NASL description This update of Adobe Flash Player fixes the following issues : - A stack overflow vulnerability that could have resulted in arbitrary code execution. (CVE-2014-0498) - A memory leak vulnerability that could have been used to defeat memory address layout randomization. (CVE-2014-0499) - A double free vulnerability that could have resulted in arbitrary code execution. (CVE-2014-0502) last seen 2020-06-05 modified 2014-02-26 plugin id 72700 published 2014-02-26 reporter This script is Copyright (C) 2014-2020 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/72700 title SuSE 11.3 Security Update : flash-player (SAT Patch Number 8922) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2014-0196.NASL description An updated Adobe Flash Player package that fixes three security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed in the Adobe Security bulletin APSB14-07, listed in the References section. Specially crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content. (CVE-2014-0498, CVE-2014-0499, CVE-2014-0502) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.341. last seen 2020-06-01 modified 2020-06-02 plugin id 72643 published 2014-02-23 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/72643 title RHEL 5 / 6 : flash-plugin (RHSA-2014:0196)
Redhat
advisories |
| ||||
rpms |
|
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 65704 CVE(CAN) ID: CVE-2014-0498 Adobe Flash Player是一个集成的多媒体播放器。Adobe AIR是针对网络与桌面应用的结合所开发出来的技术,可以不必经由浏览器而对网络上的云端程式做控制。 Adobe Flash Player及AIR在处理含有特制Flash内容的恶意网页时存在多个漏洞,包括栈溢出、内存泄露、双重释放漏洞,未经身份验证的远程攻击者可利用这漏洞执行任意代码,最终完全控制受影响系统。 0 Adobe Flash Player < 12.0.0.44 Adobe Flash Player < 11.2.202.336 Adobe AIR 4.0.0.1390 Adobe AIR 3.9.0.1390 SDK 厂商补丁: Adobe ----- Adobe已经为此发布了一个安全公告(apsb14-07)以及相应补丁: apsb14-07:Security updates available for Adobe Flash Player 链接:http://helpx.adobe.com/security/products/flash-player/apsb14-07.html |
id | SSV:61526 |
last seen | 2017-11-19 |
modified | 2014-02-21 |
published | 2014-02-21 |
reporter | Root |
title | Adobe Flash Player及AIR远程栈溢出漏洞(CVE-2014-0498) |
The Hacker News
id | THN:F302CDA9688F8F9725A0957D7EE3FB30 |
last seen | 2018-01-27 |
modified | 2014-02-22 |
published | 2014-02-21 |
reporter | Sudhir K Bansal |
source | https://thehackernews.com/2014/02/adobe-releases-another-emergency.html |
title | Adobe releases another Emergency Security Patch for Flash Player |
References
- http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
- http://helpx.adobe.com/security/products/flash-player/apsb14-07.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html
- http://rhn.redhat.com/errata/RHSA-2014-0196.html
- http://rhn.redhat.com/errata/RHSA-2014-0196.html
- http://security.gentoo.org/glsa/glsa-201405-04.xml
- http://security.gentoo.org/glsa/glsa-201405-04.xml