Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
22 Oct 2025, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 02:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
| References | () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List | |
| References | () http://rhn.redhat.com/errata/RHSA-2014-0137.html - Third Party Advisory | |
| References | () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
| References | () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
| References | () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
| References | () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
| References | () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
| References | () http://www.exploit-db.com/exploits/33212 - Third Party Advisory, VDB Entry | |
| References | () http://www.osvdb.org/102849 - Broken Link | |
| References | () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90884 - Third Party Advisory, VDB Entry |
19 Sep 2024, 19:56
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
| References | () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List | |
| References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List | |
| References | () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
| References | () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
| References | () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
| References | () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
| References | () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
| First Time |
Suse
Opensuse opensuse Apple macos Google chrome Redhat Redhat enterprise Linux Workstation Opensuse Google chrome Os Suse linux Enterprise Desktop Redhat enterprise Linux Server Redhat enterprise Linux Eus Redhat enterprise Linux Desktop Redhat enterprise Linux Server Aus |
|
| CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
| CPE | cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* |
18 Sep 2024, 19:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 8.8 |
| CWE | CWE-191 |
Information
Published : 2014-02-05 05:15
Updated : 2025-10-22 01:15
NVD link : CVE-2014-0497
Mitre link : CVE-2014-0497
CVE.ORG link : CVE-2014-0497
JSON object : View
Products Affected
apple
- mac_os_x
- macos
redhat
- enterprise_linux_desktop
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux_server_aus
- chrome_os
- chrome
adobe
- flash_player
microsoft
- windows
opensuse
- opensuse
suse
- linux_enterprise_desktop
linux
- linux_kernel
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
