CVE-2016-4273

Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2016-2057.html Third Party Advisory
http://www.securityfocus.com/bid/93490 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036985 Broken Link Third Party Advisory VDB Entry
https://helpx.adobe.com/security/products/flash-player/apsb16-32.html Patch Vendor Advisory
https://security.gentoo.org/glsa/201610-10 Third Party Advisory
https://www.exploit-db.com/exploits/40510/ Exploit Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2016-2057.html Third Party Advisory
http://www.securityfocus.com/bid/93490 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036985 Broken Link Third Party Advisory VDB Entry
https://helpx.adobe.com/security/products/flash-player/apsb16-32.html Patch Vendor Advisory
https://security.gentoo.org/glsa/201610-10 Third Party Advisory
https://www.exploit-db.com/exploits/40510/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*
OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
OR cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*
cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:linux:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:51

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2057.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2016-2057.html - Third Party Advisory
References () http://www.securityfocus.com/bid/93490 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/93490 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1036985 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1036985 - Broken Link, Third Party Advisory, VDB Entry
References () https://helpx.adobe.com/security/products/flash-player/apsb16-32.html - Patch, Vendor Advisory () https://helpx.adobe.com/security/products/flash-player/apsb16-32.html - Patch, Vendor Advisory
References () https://security.gentoo.org/glsa/201610-10 - Third Party Advisory () https://security.gentoo.org/glsa/201610-10 - Third Party Advisory
References () https://www.exploit-db.com/exploits/40510/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/40510/ - Exploit, Third Party Advisory, VDB Entry

18 Nov 2022, 16:37

Type Values Removed Values Added
CWE CWE-119 CWE-787
CPE cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:linux:*:*
cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
CVSS v2 : 10.0
v3 : 9.8
v2 : 9.3
v3 : 8.8
References (SECTRACK) http://www.securitytracker.com/id/1036985 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1036985 - Broken Link, Third Party Advisory, VDB Entry
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/40510/ - Third Party Advisory, VDB Entry (EXPLOIT-DB) https://www.exploit-db.com/exploits/40510/ - Exploit, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/93490 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/93490 - Broken Link, Third Party Advisory, VDB Entry

Information

Published : 2016-10-13 19:59

Updated : 2024-11-21 02:51


NVD link : CVE-2016-4273

Mitre link : CVE-2016-4273

CVE.ORG link : CVE-2016-4273


JSON object : View

Products Affected

microsoft

  • windows
  • windows_8.1
  • windows_10

google

  • chrome_os

adobe

  • flash_player_desktop_runtime
  • flash_player

linux

  • linux_kernel

apple

  • mac_os_x
CWE
CWE-787

Out-of-bounds Write