Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
References | () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2014-0137.html - Third Party Advisory | |
References | () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
References | () http://www.exploit-db.com/exploits/33212 - Third Party Advisory, VDB Entry | |
References | () http://www.osvdb.org/102849 - Broken Link | |
References | () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90884 - Third Party Advisory, VDB Entry |
19 Sep 2024, 19:56
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
References | () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List | |
References | () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
CPE | cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* |
|
First Time |
Google chrome Os
Apple macos Redhat Redhat enterprise Linux Workstation Suse Suse linux Enterprise Desktop Redhat enterprise Linux Server Redhat enterprise Linux Server Aus Redhat enterprise Linux Eus Opensuse Redhat enterprise Linux Desktop Opensuse opensuse Google chrome |
18 Sep 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 8.8 |
CWE | CWE-191 |
Information
Published : 2014-02-05 05:15
Updated : 2025-04-11 00:51
NVD link : CVE-2014-0497
Mitre link : CVE-2014-0497
CVE.ORG link : CVE-2014-0497
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_eus
- enterprise_linux_server
suse
- linux_enterprise_desktop
opensuse
- opensuse
- chrome
- chrome_os
linux
- linux_kernel
microsoft
- windows
apple
- mac_os_x
- macos
adobe
- flash_player
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)