10

CVE-2015-5123

Warnung

Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OpensuseEvergreen Version11.4
SuseLinux Enterprise Desktop Version11 Updatesp3
SuseLinux Enterprise Desktop Version11 Updatesp4
AdobeFlash Player Version >= 11.0 <= 11.2.202.481
   LinuxLinux Kernel Version-
AdobeFlash Player SwEditionesr Version >= 13.0 <= 13.0.0.302
   ApplemacOS Version-
   MicrosoftWindows Version-
AdobeFlash Player SwEditionchrome Version >= 18.0 <= 18.0.0.203
   ApplemacOS Version-
   MicrosoftWindows Version-
AdobeFlash Player Desktop Runtime Version >= 18.0 <= 18.0.0.203
   ApplemacOS Version-
   MicrosoftWindows Version-

13.04.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

Adobe Flash Player Use-After-Free Vulnerability

Schwachstelle

Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to execute code or cause a denial-of-service (DoS).

Beschreibung

The impacted product is end-of-life and should be disconnected if still in use.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 45.2% 0.975
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.

http://marc.info/?l=bugtraq&m=144050155601375&w=2
Third Party Advisory
Mailing List
http://www.us-cert.gov/ncas/alerts/TA15-195A
Third Party Advisory
US Government Resource
http://www.securitytracker.com/id/1032890
Third Party Advisory
Broken Link
VDB Entry
http://www.kb.cert.org/vuls/id/918568
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/75710
Third Party Advisory
Broken Link
VDB Entry