Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
References | () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2014-0137.html - Third Party Advisory | |
References | () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
References | () http://www.exploit-db.com/exploits/33212 - Third Party Advisory, VDB Entry | |
References | () http://www.osvdb.org/102849 - Broken Link | |
References | () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90884 - Third Party Advisory, VDB Entry |
19 Sep 2024, 19:56
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
References | () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List | |
References | () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
First Time |
Suse
Opensuse opensuse Apple macos Google chrome Redhat Redhat enterprise Linux Workstation Opensuse Google chrome Os Suse linux Enterprise Desktop Redhat enterprise Linux Server Redhat enterprise Linux Eus Redhat enterprise Linux Desktop Redhat enterprise Linux Server Aus |
|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CPE | cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* |
18 Sep 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-191 | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 8.8 |
Information
Published : 2014-02-05 05:15
Updated : 2024-12-20 14:20
NVD link : CVE-2014-0497
Mitre link : CVE-2014-0497
CVE.ORG link : CVE-2014-0497
JSON object : View
Products Affected
microsoft
- windows
redhat
- enterprise_linux_eus
- enterprise_linux_workstation
- enterprise_linux_server_aus
- enterprise_linux_server
- enterprise_linux_desktop
apple
- macos
- mac_os_x
linux
- linux_kernel
- chrome
- chrome_os
opensuse
- opensuse
suse
- linux_enterprise_desktop
adobe
- flash_player
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)