9.3

CVE-2011-0611

Warning
Exploit

Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and earlier on Android; Adobe AIR before 2.6.19140; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader 9.x before 9.4.4 and 10.x through 10.0.1 on Windows, Adobe Reader 9.x before 9.4.4 and 10.x before 10.0.3 on Mac OS X, and Adobe Acrobat 9.x before 9.4.4 and 10.x before 10.0.3 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content; as demonstrated by a Microsoft Office document with an embedded .swf file that has a size inconsistency in a "group of included constants," object type confusion, ActionScript that adds custom functions to prototypes, and Date objects; and as exploited in the wild in April 2011.

Data is provided by the National Vulnerability Database (NVD)
AdobeFlash Player Version < 10.2.154.27
   ApplemacOS X Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
   OracleSolaris Version-
AdobeFlash Player Version <= 10.2.156.12
   GoogleAndroid Version-
AdobeAcrobat Reader Version >= 9.0 < 9.4.4
   MicrosoftWindows Version-
AdobeAcrobat Reader Version >= 10.0 <= 10.0.1
   MicrosoftWindows Version-
AdobeAdobe Air Version < 2.6.19140
AdobeAcrobat Reader Version >= 9.0 < 9.4.4
   ApplemacOS X Version-
AdobeAcrobat Reader Version >= 10.0 < 10.0.3
   ApplemacOS X Version-
AdobeAcrobat Version >= 9.0 < 9.4
   ApplemacOS X Version-
   MicrosoftWindows Version-
AdobeAcrobat Version >= 10.0 < 10.0.3
   ApplemacOS X Version-
   MicrosoftWindows Version-
GoogleChrome Version < 10.0.648.205
   ApplemacOS X Version-
   GoogleChrome Os Version-
   LinuxLinux Kernel Version-
   MicrosoftWindows Version-
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
OpensuseOpensuse Version11.4
SuseLinux Enterprise Desktop Version10 Updatesp4 SwEdition-
SuseLinux Enterprise Desktop Version11 Updatesp1

03.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Adobe Flash Player Remote Code Execution Vulnerability

Vulnerability

Adobe Flash Player contains a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content.

Description

The impacted product is end-of-life and should be disconnected if still in use.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 92.9% 0.998
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-843 Access of Resource Using Incompatible Type ('Type Confusion')

The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.

http://secunia.com/advisories/44119
Vendor Advisory
Broken Link
http://secunia.com/advisories/44141
Vendor Advisory
Broken Link
http://secunia.com/advisories/44149
Vendor Advisory
Broken Link
http://secunia.com/blog/210/
Vendor Advisory
Broken Link
http://www.exploit-db.com/exploits/17175
Third Party Advisory
Exploit
VDB Entry
http://www.kb.cert.org/vuls/id/230057
Third Party Advisory
US Government Resource
Broken Link
http://www.securityfocus.com/bid/47314
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1025324
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1025325
Third Party Advisory
Broken Link
VDB Entry