Vulnerabilities > CVE-2015-8452 - Use After Free Remote Code Execution vulnerability in Adobe Flash Player and AIR APSB15-32

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
adobe
apple
microsoft
google
linux
critical
nessus

Summary

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, and CVE-2015-8454. <a href="https://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>

Vulnerable Configurations

Part Description Count
Application
Adobe
416
OS
Apple
2
OS
Microsoft
1
OS
Google
1
OS
Linux
1

Nessus

  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_ADOBE_AIR_APSB15-32.NASL
    descriptionThe version of Adobe AIR installed on the remote Mac OS X host is equal or prior to version 19.0.0.241. It is, therefore, affected by multiple vulnerabilities : - Multiple heap buffer overflow conditions exist that allow an attacker to execute arbitrary code. (CVE-2015-8438, CVE-2015-8446) - Multiple memory corruption issues exist that allow an attacker to execute arbitrary code. (CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, CVE-2015-8658, CVE-2015-8820) - Multiple security bypass vulnerabilities exist that allow an attacker to write arbitrary data to the file system under user permissions. (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409) - A stack buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8407, CVE-2015-8457) - A type confusion error exists that allows an attacker to execute arbitrary code. (CVE-2015-8439, CVE-2015-8456) - An integer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8445) - A buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8415) - Multiple use-after-free errors exist that allow an attacker to execute arbitrary code. (CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454, CVE-2015-8653, CVE-2015-8655, CVE-2015-8821, CVE-2015-8822
    last seen2020-06-01
    modified2020-06-02
    plugin id87246
    published2015-12-08
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87246
    titleAdobe AIR for Mac <= 19.0.0.241 Multiple Vulnerabilities (APSB15-32)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(87246);
      script_version("1.13");
      script_cvs_date("Date: 2019/11/20");
    
      script_cve_id(
        "CVE-2015-8045",
        "CVE-2015-8047",
        "CVE-2015-8048",
        "CVE-2015-8049",
        "CVE-2015-8050",
        "CVE-2015-8054",
        "CVE-2015-8055",
        "CVE-2015-8056",
        "CVE-2015-8057",
        "CVE-2015-8058",
        "CVE-2015-8059",
        "CVE-2015-8060",
        "CVE-2015-8061",
        "CVE-2015-8062",
        "CVE-2015-8063",
        "CVE-2015-8064",
        "CVE-2015-8065",
        "CVE-2015-8066",
        "CVE-2015-8067",
        "CVE-2015-8068",
        "CVE-2015-8069",
        "CVE-2015-8070",
        "CVE-2015-8071",
        "CVE-2015-8401",
        "CVE-2015-8402",
        "CVE-2015-8403",
        "CVE-2015-8404",
        "CVE-2015-8405",
        "CVE-2015-8406",
        "CVE-2015-8407",
        "CVE-2015-8408",
        "CVE-2015-8409",
        "CVE-2015-8410",
        "CVE-2015-8411",
        "CVE-2015-8412",
        "CVE-2015-8413",
        "CVE-2015-8414",
        "CVE-2015-8415",
        "CVE-2015-8416",
        "CVE-2015-8417",
        "CVE-2015-8418",
        "CVE-2015-8419",
        "CVE-2015-8420",
        "CVE-2015-8421",
        "CVE-2015-8422",
        "CVE-2015-8423",
        "CVE-2015-8424",
        "CVE-2015-8425",
        "CVE-2015-8426",
        "CVE-2015-8427",
        "CVE-2015-8428",
        "CVE-2015-8429",
        "CVE-2015-8430",
        "CVE-2015-8431",
        "CVE-2015-8432",
        "CVE-2015-8433",
        "CVE-2015-8434",
        "CVE-2015-8435",
        "CVE-2015-8436",
        "CVE-2015-8437",
        "CVE-2015-8438",
        "CVE-2015-8439",
        "CVE-2015-8440",
        "CVE-2015-8441",
        "CVE-2015-8442",
        "CVE-2015-8443",
        "CVE-2015-8444",
        "CVE-2015-8445",
        "CVE-2015-8446",
        "CVE-2015-8447",
        "CVE-2015-8448",
        "CVE-2015-8449",
        "CVE-2015-8450",
        "CVE-2015-8451",
        "CVE-2015-8452",
        "CVE-2015-8453",
        "CVE-2015-8454",
        "CVE-2015-8455",
        "CVE-2015-8456",
        "CVE-2015-8457",
        "CVE-2015-8652",
        "CVE-2015-8653",
        "CVE-2015-8654",
        "CVE-2015-8655",
        "CVE-2015-8656",
        "CVE-2015-8657",
        "CVE-2015-8658",
        "CVE-2015-8820",
        "CVE-2015-8821",
        "CVE-2015-8822"
      );
      script_bugtraq_id(
        78710,
        78712,
        78713,
        78714,
        78715,
        78716,
        78717,
        78718,
        78802
      );
      script_xref(name:"ZDI", value:"ZDI-15-601");
      script_xref(name:"ZDI", value:"ZDI-15-602");
      script_xref(name:"ZDI", value:"ZDI-15-603");
      script_xref(name:"ZDI", value:"ZDI-15-604");
      script_xref(name:"ZDI", value:"ZDI-15-605");
      script_xref(name:"ZDI", value:"ZDI-15-606");
      script_xref(name:"ZDI", value:"ZDI-15-607");
      script_xref(name:"ZDI", value:"ZDI-15-608");
      script_xref(name:"ZDI", value:"ZDI-15-609");
      script_xref(name:"ZDI", value:"ZDI-15-610");
      script_xref(name:"ZDI", value:"ZDI-15-611");
      script_xref(name:"ZDI", value:"ZDI-15-612");
      script_xref(name:"ZDI", value:"ZDI-15-613");
      script_xref(name:"ZDI", value:"ZDI-15-614");
      script_xref(name:"ZDI", value:"ZDI-15-655");
      script_xref(name:"ZDI", value:"ZDI-15-656");
      script_xref(name:"ZDI", value:"ZDI-15-657");
      script_xref(name:"ZDI", value:"ZDI-15-658");
      script_xref(name:"ZDI", value:"ZDI-15-659");
      script_xref(name:"ZDI", value:"ZDI-15-660");
      script_xref(name:"ZDI", value:"ZDI-15-661");
      script_xref(name:"ZDI", value:"ZDI-15-662");
      script_xref(name:"ZDI", value:"ZDI-15-663");
      script_xref(name:"ZDI", value:"ZDI-15-664");
      script_xref(name:"EDB-ID", value:"39042");
      script_xref(name:"EDB-ID", value:"39043");
      script_xref(name:"EDB-ID", value:"39047");
      script_xref(name:"EDB-ID", value:"39049");
      script_xref(name:"EDB-ID", value:"39051");
      script_xref(name:"EDB-ID", value:"39052");
      script_xref(name:"EDB-ID", value:"39053");
      script_xref(name:"EDB-ID", value:"39054");
      script_xref(name:"EDB-ID", value:"39072");
    
      script_name(english:"Adobe AIR for Mac <= 19.0.0.241 Multiple Vulnerabilities (APSB15-32)");
      script_summary(english:"Checks the version of AIR.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Mac OS X host has a browser plugin installed that is
    affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Adobe AIR installed on the remote Mac OS X host is
    equal or prior to version 19.0.0.241. It is, therefore, affected by
    multiple vulnerabilities :
    
      - Multiple heap buffer overflow conditions exist that
        allow an attacker to execute arbitrary code.
        (CVE-2015-8438, CVE-2015-8446)
    
      - Multiple memory corruption issues exist that allow an
        attacker to execute arbitrary code. (CVE-2015-8045,
        CVE-2015-8047, CVE-2015-8060, CVE-2015-8408,
        CVE-2015-8416, CVE-2015-8417, CVE-2015-8418,
        CVE-2015-8419, CVE-2015-8443, CVE-2015-8444,
        CVE-2015-8451, CVE-2015-8455, CVE-2015-8652,
        CVE-2015-8654, CVE-2015-8656, CVE-2015-8657,
        CVE-2015-8658, CVE-2015-8820)
    
      - Multiple security bypass vulnerabilities exist that
        allow an attacker to write arbitrary data to the file
        system under user permissions. (CVE-2015-8453,
        CVE-2015-8440,  CVE-2015-8409)
    
      - A stack buffer overflow condition exists that allows an
        attacker to execute arbitrary code. (CVE-2015-8407,
        CVE-2015-8457)
    
      - A type confusion error exists that allows an attacker to
        execute arbitrary code. (CVE-2015-8439, CVE-2015-8456)
    
      - An integer overflow condition exists that allows an
        attacker to execute arbitrary code. (CVE-2015-8445)
    
      - A buffer overflow condition exists that allows an
        attacker to execute arbitrary code. (CVE-2015-8415)
    
      - Multiple use-after-free errors exist that allow an
        attacker to execute arbitrary code. (CVE-2015-8048,
        CVE-2015-8049, CVE-2015-8050, CVE-2015-8055,
        CVE-2015-8056, CVE-2015-8057, CVE-2015-8058,
        CVE-2015-8059, CVE-2015-8061, CVE-2015-8062,
        CVE-2015-8063, CVE-2015-8064, CVE-2015-8065,
        CVE-2015-8066, CVE-2015-8067, CVE-2015-8068,
        CVE-2015-8069, CVE-2015-8070, CVE-2015-8071,
        CVE-2015-8401, CVE-2015-8402, CVE-2015-8403,
        CVE-2015-8404, CVE-2015-8405, CVE-2015-8406,
        CVE-2015-8410, CVE-2015-8411, CVE-2015-8412,
        CVE-2015-8413, CVE-2015-8414, CVE-2015-8420,
        CVE-2015-8421, CVE-2015-8422, CVE-2015-8423,
        CVE-2015-8424, CVE-2015-8425, CVE-2015-8426,
        CVE-2015-8427, CVE-2015-8428, CVE-2015-8429,
        CVE-2015-8430, CVE-2015-8431, CVE-2015-8432,
        CVE-2015-8433, CVE-2015-8434, CVE-2015-8435,
        CVE-2015-8436, CVE-2015-8437, CVE-2015-8441,
        CVE-2015-8442, CVE-2015-8447, CVE-2015-8448,
        CVE-2015-8449, CVE-2015-8450, CVE-2015-8452,
        CVE-2015-8454, CVE-2015-8653, CVE-2015-8655,
        CVE-2015-8821, CVE-2015-8822");
      script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/flash-player/apsb15-32.html");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Adobe AIR version 20.0.0.204 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-8457");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/12/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/12/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/12/08");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:air");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("macosx_adobe_air_installed.nasl");
      script_require_keys("MacOSX/Adobe_AIR/Version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    kb_base = "MacOSX/Adobe_AIR";
    version = get_kb_item_or_exit(kb_base+"/Version");
    path = get_kb_item_or_exit(kb_base+"/Path");
    
    # nb: we're checking for versions less than *or equal to* the cutoff!
    cutoff_version = '19.0.0.245';
    fixed_version_for_report = '20.0.0.204';
    
    if (ver_compare(ver:version, fix:cutoff_version, strict:FALSE) <= 0)
    {
      if (report_verbosity > 0)
      {
        report =
          '\n  Path              : ' + path +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : ' + fixed_version_for_report +
          '\n';
        security_hole(port:0, extra:report);
      }
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_INST_PATH_NOT_VULN, "Adobe AIR", version, path);
    
  • NASL familyWindows
    NASL idSMB_KB3119147.NASL
    descriptionThe remote Windows host is missing KB3119147. It is, therefore, affected by multiple vulnerabilities : - Multiple heap buffer overflow conditions exist that allow an attacker to execute arbitrary code. (CVE-2015-8438, CVE-2015-8446) - Multiple memory corruption issues exist that allow an attacker to execute arbitrary code. (CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455) - Multiple security bypass vulnerabilities exist that allow an attacker to write arbitrary data to the file system under user permissions. (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409) - A stack buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8407, CVE-2015-8457) - A type confusion error exists that allows an attacker to execute arbitrary code. (CVE-2015-8439, CVE-2015-8456) - An integer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8445) - A buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8415) - Multiple use-after-free errors exist that allow an attacker to execute arbitrary code. (CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454)
    last seen2020-06-01
    modified2020-06-02
    plugin id87249
    published2015-12-08
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87249
    titleMS KB3119147: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_C8842A849DDD11E58C2FC485083CA99C.NASL
    descriptionAdobe reports : These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-8438, CVE-2015-8446). These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417, CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8053, CVE-2015-8045, CVE-2015-8051, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408). These updates resolve security bypass vulnerabilities (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409). These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2015-8407). These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-8439). These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-8445). These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-8415). These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437, CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452, CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411, CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426, CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434, CVE-2015-8435, CVE-2015-8414, CVE-2015-8052, CVE-2015-8059, CVE-2015-8058, CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067, CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065, CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403, CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447).
    last seen2020-06-01
    modified2020-06-02
    plugin id87270
    published2015-12-09
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87270
    titleFreeBSD : flash -- multiple vulnerabilities (c8842a84-9ddd-11e5-8c2f-c485083ca99c)
  • NASL familyWindows
    NASL idGOOGLE_CHROME_47_0_2526_80.NASL
    descriptionThe version of Google Chrome installed on the remote Windows host is prior to 47.0.2526.80. It is, therefore, affected by multiple vulnerabilities : - A type confusion error exists related to extensions that allows an attacker to have an unspecified impact. (CVE-2015-6788) - A use-after-free error exists in Blink that is triggered when handling updates. An unauthenticated, remote attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2015-6789) - An unspecified escaping issue exists in saved pages. (CVE-2015-6790) - Multiple unspecified vulnerabilities exist that an attacker can exploit to have an unspecified impact. (CVE-2015-6791) - Multiple heap buffer overflow conditions exist that allow an attacker to execute arbitrary code. (CVE-2015-8438, CVE-2015-8446) - Multiple memory corruption issues exist that allow an attacker to execute arbitrary code. (CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455) - Multiple security bypass vulnerabilities exist that allow an attacker to write arbitrary data to the file system under user permissions. (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409) - A stack buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8407, CVE-2015-8457) - A type confusion error exists that allows an attacker to execute arbitrary code. (CVE-2015-8439, CVE-2015-8456) - An integer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8445) - A buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8415) - Multiple use-after-free errors exist that allow an attacker to execute arbitrary code. (CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454) - A flaw exists in Google V8 in serialize.cc that is triggered when handling alignment for deferred objects. An attacker can exploit this to have an unspecified impact. (CVE-2015-8548)
    last seen2020-06-01
    modified2020-06-02
    plugin id87245
    published2015-12-08
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87245
    titleGoogle Chrome < 47.0.2526.80 Multiple Vulnerabilities
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-2593.NASL
    descriptionAn updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in. This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin APSB15-32 listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2015-8045, CVE-2015-8047, CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8060, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8407, CVE-2015-8408, CVE-2015-8409, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8415, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8438, CVE-2015-8439, CVE-2015-8440, CVE-2015-8441, CVE-2015-8442, CVE-2015-8443, CVE-2015-8444, CVE-2015-8445, CVE-2015-8446, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8451, CVE-2015-8452, CVE-2015-8453, CVE-2015-8454, CVE-2015-8455) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.554.
    last seen2020-06-01
    modified2020-06-02
    plugin id87304
    published2015-12-10
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87304
    titleRHEL 5 / 6 : flash-plugin (RHSA-2015:2593)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_FLASH_PLAYER_APSB15-32.NASL
    descriptionThe version of Adobe Flash Player installed on the remote Windows host is equal or prior to version 19.0.0.245. It is, therefore, affected by multiple vulnerabilities : - Multiple heap buffer overflow conditions exist that allow an attacker to execute arbitrary code. (CVE-2015-8438, CVE-2015-8446) - Multiple memory corruption issues exist that allow an attacker to execute arbitrary code. (CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, CVE-2015-8658, CVE-2015-8820) - Multiple security bypass vulnerabilities exist that allow an attacker to write arbitrary data to the file system under user permissions. (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409) - A stack buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8407, CVE-2015-8457) - A type confusion error exists that allows an attacker to execute arbitrary code. (CVE-2015-8439, CVE-2015-8456) - An integer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8445) - A buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8415) - Multiple use-after-free errors exist that allow an attacker to execute arbitrary code. (CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454, CVE-2015-8653, CVE-2015-8655, CVE-2015-8821, CVE-2015-8822
    last seen2020-06-01
    modified2020-06-02
    plugin id87247
    published2015-12-08
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87247
    titleAdobe Flash Player for Mac <= 19.0.0.245 Multiple Vulnerabilities (APSB15-32)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_GOOGLE_CHROME_47_0_2526_80.NASL
    descriptionThe version of Google Chrome installed on the remote Mac OS X host is prior to 47.0.2526.80. It is, therefore, affected by multiple vulnerabilities : - A type confusion error exists related to extensions that allows an attacker to have an unspecified impact. (CVE-2015-6788) - A use-after-free error exists in Blink that is triggered when handling updates. An unauthenticated, remote attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2015-6789) - An unspecified escaping issue exists in saved pages. (CVE-2015-6790) - Multiple unspecified vulnerabilities exist that an attacker can exploit to have an unspecified impact. (CVE-2015-6791) - Multiple heap buffer overflow conditions exist that allow an attacker to execute arbitrary code. (CVE-2015-8438, CVE-2015-8446) - Multiple memory corruption issues exist that allow an attacker to execute arbitrary code. (CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455) - Multiple security bypass vulnerabilities exist that allow an attacker to write arbitrary data to the file system under user permissions. (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409) - A stack buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8407, CVE-2015-8457) - A type confusion error exists that allows an attacker to execute arbitrary code. (CVE-2015-8439, CVE-2015-8456) - An integer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8445) - A buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8415) - Multiple use-after-free errors exist that allow an attacker to execute arbitrary code. (CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454) - A flaw exists in Google V8 in serialize.cc that is triggered when handling alignment for deferred objects. An attacker can exploit this to have an unspecified impact. (CVE-2015-8548)
    last seen2020-06-01
    modified2020-06-02
    plugin id87248
    published2015-12-08
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87248
    titleGoogle Chrome < 47.0.2526.80 Multiple Vulnerabilities (Mac OS X)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-2236-1.NASL
    descriptionThis update for flash-player to version 11.2.202.554 fixes the following security issues in Adobe security advisory APSB15-32. - These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-8438, CVE-2015-8446). - These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417, CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045, CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408). - These updates resolve security bypass vulnerabilities (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409). - These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2015-8407). - These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-8439). - These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-8445). - These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-8415) - These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437, CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452, CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411, CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426, CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434, CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058, CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067, CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065, CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403, CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447). Please also see https://helpx.adobe.com/security/products/flash-player/apsb15-32.html Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id87317
    published2015-12-11
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87317
    titleSUSE SLED11 Security Update : flash-player (SUSE-SU-2015:2236-1)
  • NASL familyWindows
    NASL idFLASH_PLAYER_APSB15-32.NASL
    descriptionThe version of Adobe Flash Player installed on the remote Windows host is equal or prior to version 19.0.0.245. It is, therefore, affected by multiple vulnerabilities : - Multiple heap buffer overflow conditions exist that allow an attacker to execute arbitrary code. (CVE-2015-8438, CVE-2015-8446) - Multiple memory corruption issues exist that allow an attacker to execute arbitrary code. (CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, CVE-2015-8658, CVE-2015-8820) - Multiple security bypass vulnerabilities exist that allow an attacker to write arbitrary data to the file system under user permissions. (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409) - A stack buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8407, CVE-2015-8457) - A type confusion error exists that allows an attacker to execute arbitrary code. (CVE-2015-8439, CVE-2015-8456) - An integer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8445) - A buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8415) - Multiple use-after-free errors exist that allow an attacker to execute arbitrary code. (CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454, CVE-2015-8653, CVE-2015-8655, CVE-2015-8821, CVE-2015-8822
    last seen2020-06-01
    modified2020-06-02
    plugin id87244
    published2015-12-08
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87244
    titleAdobe Flash Player <= 19.0.0.245 Multiple Vulnerabilities (APSB15-32)
  • NASL familyWindows
    NASL idADOBE_AIR_APSB15-32.NASL
    descriptionThe version of Adobe AIR installed on the remote Windows host is equal or prior to version 19.0.0.241. It is, therefore, affected by multiple vulnerabilities : - Multiple heap buffer overflow conditions exist that allow an attacker to execute arbitrary code. (CVE-2015-8438, CVE-2015-8446) - Multiple memory corruption issues exist that allow an attacker to execute arbitrary code. (CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, CVE-2015-8455, CVE-2015-8652, CVE-2015-8654, CVE-2015-8656, CVE-2015-8657, CVE-2015-8658, CVE-2015-8820) - Multiple security bypass vulnerabilities exist that allow an attacker to write arbitrary data to the file system under user permissions. (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409) - A stack buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8407, CVE-2015-8457) - A type confusion error exists that allows an attacker to execute arbitrary code. (CVE-2015-8439, CVE-2015-8456) - An integer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8445) - A buffer overflow condition exists that allows an attacker to execute arbitrary code. (CVE-2015-8415) - Multiple use-after-free errors exist that allow an attacker to execute arbitrary code. (CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, CVE-2015-8454, CVE-2015-8653, CVE-2015-8655, CVE-2015-8821, CVE-2015-8822
    last seen2020-06-01
    modified2020-06-02
    plugin id87243
    published2015-12-08
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87243
    titleAdobe AIR <= 19.0.0.241 Multiple Vulnerabilities (APSB15-32)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-882.NASL
    descriptionThis update for flash-player to version 11.2.202.554 fixes the following security issues in Adobe security advisory APSB15-32. - These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-8438, CVE-2015-8446). - These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417, CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045, CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408). - These updates resolve security bypass vulnerabilities (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409). - These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2015-8407). - These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-8439). - These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-8445). - These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-8415) - These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437, CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452, CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411, CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426, CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434, CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058, CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067, CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065, CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403, CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447). Please also see &#9;https://helpx.adobe.com/security/products/flash-player/apsb15-32.h tml
    last seen2020-06-05
    modified2016-01-04
    plugin id87714
    published2016-01-04
    reporterThis script is Copyright (C) 2016-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87714
    titleopenSUSE Security Update : flash-player (openSUSE-2015-882)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-2247-1.NASL
    descriptionThis update for flash-player to version 11.2.202.554 fixes the following security issues in Adobe security advisory APSB15-32. - These updates resolve heap buffer overflow vulnerabilities that could lead to code execution (CVE-2015-8438, CVE-2015-8446). - These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2015-8444, CVE-2015-8443, CVE-2015-8417, CVE-2015-8416, CVE-2015-8451, CVE-2015-8047, CVE-2015-8455, CVE-2015-8045, CVE-2015-8418, CVE-2015-8060, CVE-2015-8419, CVE-2015-8408). - These updates resolve security bypass vulnerabilities (CVE-2015-8453, CVE-2015-8440, CVE-2015-8409). - These updates resolve a stack overflow vulnerability that could lead to code execution (CVE-2015-8407). - These updates resolve a type confusion vulnerability that could lead to code execution (CVE-2015-8439). - These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2015-8445). - These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2015-8415) - These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2015-8050, CVE-2015-8049, CVE-2015-8437, CVE-2015-8450, CVE-2015-8449, CVE-2015-8448, CVE-2015-8436, CVE-2015-8452, CVE-2015-8048, CVE-2015-8413, CVE-2015-8412, CVE-2015-8410, CVE-2015-8411, CVE-2015-8424, CVE-2015-8422, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8425, CVE-2015-8433, CVE-2015-8432, CVE-2015-8431, CVE-2015-8426, CVE-2015-8430, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8434, CVE-2015-8435, CVE-2015-8414, CVE-2015-8454, CVE-2015-8059, CVE-2015-8058, CVE-2015-8055, CVE-2015-8057, CVE-2015-8056, CVE-2015-8061, CVE-2015-8067, CVE-2015-8066, CVE-2015-8062, CVE-2015-8068, CVE-2015-8064, CVE-2015-8065, CVE-2015-8063, CVE-2015-8405, CVE-2015-8404, CVE-2015-8402, CVE-2015-8403, CVE-2015-8071, CVE-2015-8401, CVE-2015-8406, CVE-2015-8069, CVE-2015-8070, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447). Please also see https://helpx.adobe.com/security/products/flash-player/apsb15-32.html Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id87319
    published2015-12-11
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87319
    titleSUSE SLED12 Security Update : flash-player (SUSE-SU-2015:2247-1)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201601-03.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201601-03 (Adobe Flash Player: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id88392
    published2016-01-27
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/88392
    titleGLSA-201601-03 : Adobe Flash Player: Multiple vulnerabilities

Redhat

rpms
  • flash-plugin-0:11.2.202.554-1.el5
  • flash-plugin-0:11.2.202.554-1.el6_7