CVE-2013-2555

Integer overflow in Adobe Flash Player before 10.3.183.75 and 11.x before 11.7.700.169 on Windows and Mac OS X, before 10.3.183.75 and 11.x before 11.2.202.280 on Linux, before 11.1.111.50 on Android 2.x and 3.x, and before 11.1.115.54 on Android 4.x; Adobe AIR before 3.7.0.1530; and Adobe AIR SDK & Compiler before 3.7.0.1530 allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
References
Link Resource
http://archives.neohapsis.com/archives/bugtraq/2013-04/0197.html Broken Link
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157 Permissions Required
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139455789818399&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0730.html Third Party Advisory
http://twitter.com/VUPEN/statuses/309713355466227713 Broken Link
http://twitter.com/thezdi/statuses/309756927301283840 Third Party Advisory
http://www.adobe.com/support/security/bulletins/apsb13-11.html Vendor Advisory
http://archives.neohapsis.com/archives/bugtraq/2013-04/0197.html Broken Link
http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157 Permissions Required
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139455789818399&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0730.html Third Party Advisory
http://twitter.com/VUPEN/statuses/309713355466227713 Broken Link
http://twitter.com/thezdi/statuses/309756927301283840 Third Party Advisory
http://www.adobe.com/support/security/bulletins/apsb13-11.html Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:51

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2013-04/0197.html - Broken Link () http://archives.neohapsis.com/archives/bugtraq/2013-04/0197.html - Broken Link
References () http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157 - Permissions Required () http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157 - Permissions Required
References () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00016.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00019.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-updates/2013-04/msg00081.html - Mailing List, Third Party Advisory
References () http://marc.info/?l=bugtraq&m=139455789818399&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=139455789818399&w=2 - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0730.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2013-0730.html - Third Party Advisory
References () http://twitter.com/VUPEN/statuses/309713355466227713 - Broken Link () http://twitter.com/VUPEN/statuses/309713355466227713 - Broken Link
References () http://twitter.com/thezdi/statuses/309756927301283840 - Third Party Advisory () http://twitter.com/thezdi/statuses/309756927301283840 - Third Party Advisory
References () http://www.adobe.com/support/security/bulletins/apsb13-11.html - Vendor Advisory () http://www.adobe.com/support/security/bulletins/apsb13-11.html - Vendor Advisory

08 Sep 2021, 17:19

Type Values Removed Values Added
CPE cpe:2.3:o:apple:mac_os:-:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*

Information

Published : 2013-03-11 10:55

Updated : 2024-11-21 01:51


NVD link : CVE-2013-2555

Mitre link : CVE-2013-2555

CVE.ORG link : CVE-2013-2555


JSON object : View

Products Affected

google

  • android

microsoft

  • windows

redhat

  • enterprise_linux_eus
  • enterprise_linux_workstation
  • enterprise_linux_server_aus
  • enterprise_linux_server
  • enterprise_linux_desktop

apple

  • macos

linux

  • linux_kernel

adobe

  • air
  • flash_player

opensuse

  • opensuse

suse

  • linux_enterprise_desktop
CWE
CWE-190

Integer Overflow or Wraparound