Action not permitted
Modal body text goes here.
CVE-2016-4274
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
psirt@adobe.com | http://rhn.redhat.com/errata/RHSA-2016-1865.html | Third Party Advisory | |
psirt@adobe.com | http://www.securityfocus.com/bid/92930 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@adobe.com | http://www.securitytracker.com/id/1036791 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@adobe.com | https://helpx.adobe.com/security/products/flash-player/apsb16-29.html | Patch, Vendor Advisory | |
psirt@adobe.com | https://security.gentoo.org/glsa/201610-10 | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:25:14.088Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201610-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-10" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "RHSA-2016:1865", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "name": "92930", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92930" }, { "name": "1036791", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036791" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-09-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "GLSA-201610-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-10" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "RHSA-2016:1865", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "name": "92930", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92930" }, { "name": "1036791", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036791" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2016-4274", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201610-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-10" }, { "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "RHSA-2016:1865", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "name": "92930", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92930" }, { "name": "1036791", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036791" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2016-4274", "datePublished": "2016-09-14T18:00:00", "dateReserved": "2016-04-27T00:00:00", "dateUpdated": "2024-08-06T00:25:14.088Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-4274\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2016-09-14T18:59:03.217\",\"lastModified\":\"2022-11-14T19:34:30.300\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.\"},{\"lang\":\"es\",\"value\":\"Adobe Flash Player en versiones anteriores a 18.0.0.375 y 19.x hasta la versi\u00f3n 23.x en versiones anteriores a 23.0.0.162 en Windows y OS X y en versiones anteriores a 11.2.202.635 en Linux permite a atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922 y CVE-2016-6924.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.2.202.632\",\"matchCriteriaId\":\"E7CA6039-558F-4C74-95A6-5C651DD6884D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21540673-614A-4D40-8BD7-3F07723803B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93068DB-549B-45AB-8E5C-00EB5D8B5CF8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*\",\"versionEndIncluding\":\"22.0.0.211\",\"matchCriteriaId\":\"15F5093D-7418-4D20-BFBA-081D69D7AE7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*\",\"versionEndIncluding\":\"22.0.0.211\",\"matchCriteriaId\":\"CE5BB30B-7DE2-469E-AF95-D552C2BF15F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"22.0.0.211\",\"matchCriteriaId\":\"186A94B2-FFE5-48FF-BADA-0A8083C6CD3D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*\",\"versionEndIncluding\":\"18.0.0.366\",\"matchCriteriaId\":\"7DB6BA20-BD01-4169-AFE3-07DEB17381C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*\",\"versionEndIncluding\":\"22.0.0.211\",\"matchCriteriaId\":\"156F0DBE-F62C-4596-BF96-9E1224B74494\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1865.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92930\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036791\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb16-29.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201610-10\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-jqjc-23q2-72qc
Vulnerability from github
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
{ "affected": [], "aliases": [ "CVE-2016-4274" ], "database_specific": { "cwe_ids": [ "CWE-119", "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-09-14T18:59:00Z", "severity": "CRITICAL" }, "details": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "id": "GHSA-jqjc-23q2-72qc", "modified": "2022-05-14T03:57:22Z", "published": "2022-05-14T03:57:22Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4274" }, { "type": "WEB", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201610-10" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/92930" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036791" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201609-0453
Vulnerability from variot
Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. The product enables viewing of applications, content and video across screens and browsers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2016:1865-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1865.html Issue date: 2016-09-14 CVE Names: CVE-2016-4271 CVE-2016-4272 CVE-2016-4274 CVE-2016-4275 CVE-2016-4276 CVE-2016-4277 CVE-2016-4278 CVE-2016-4279 CVE-2016-4280 CVE-2016-4281 CVE-2016-4282 CVE-2016-4283 CVE-2016-4284 CVE-2016-4285 CVE-2016-4287 CVE-2016-6921 CVE-2016-6922 CVE-2016-6923 CVE-2016-6924 CVE-2016-6925 CVE-2016-6926 CVE-2016-6927 CVE-2016-6929 CVE-2016-6930 CVE-2016-6931 CVE-2016-6932 =====================================================================
- Summary:
An update for flash-plugin is now available for Red Hat Enterprise Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
- Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update upgrades Flash Player to version 11.2.202.635. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932)
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1375725 - flash-plugin: multiple code execution issues fixed in APSB16-29
- Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
x86_64: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
x86_64: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2016-4271 https://access.redhat.com/security/cve/CVE-2016-4272 https://access.redhat.com/security/cve/CVE-2016-4274 https://access.redhat.com/security/cve/CVE-2016-4275 https://access.redhat.com/security/cve/CVE-2016-4276 https://access.redhat.com/security/cve/CVE-2016-4277 https://access.redhat.com/security/cve/CVE-2016-4278 https://access.redhat.com/security/cve/CVE-2016-4279 https://access.redhat.com/security/cve/CVE-2016-4280 https://access.redhat.com/security/cve/CVE-2016-4281 https://access.redhat.com/security/cve/CVE-2016-4282 https://access.redhat.com/security/cve/CVE-2016-4283 https://access.redhat.com/security/cve/CVE-2016-4284 https://access.redhat.com/security/cve/CVE-2016-4285 https://access.redhat.com/security/cve/CVE-2016-4287 https://access.redhat.com/security/cve/CVE-2016-6921 https://access.redhat.com/security/cve/CVE-2016-6922 https://access.redhat.com/security/cve/CVE-2016-6923 https://access.redhat.com/security/cve/CVE-2016-6924 https://access.redhat.com/security/cve/CVE-2016-6925 https://access.redhat.com/security/cve/CVE-2016-6926 https://access.redhat.com/security/cve/CVE-2016-6927 https://access.redhat.com/security/cve/CVE-2016-6929 https://access.redhat.com/security/cve/CVE-2016-6930 https://access.redhat.com/security/cve/CVE-2016-6931 https://access.redhat.com/security/cve/CVE-2016-6932 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb16-29.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFX2Pp+XlSAg2UNWIIRAp1iAKCmfmh77bYTg10K3b0b6aJuxtLEgACfZlyh ynwsnFlRoTlOLVQLiobHvps= =1fXO -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Background
The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Adobe Flash Player 23.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-23.0.0.205"
All Adobe Flash Player 11.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.635"
References
[ 1 ] CVE-2016-4182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182 [ 2 ] CVE-2016-4271 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271 [ 3 ] CVE-2016-4272 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272 [ 4 ] CVE-2016-4273 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273 [ 5 ] CVE-2016-4274 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274 [ 6 ] CVE-2016-4275 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275 [ 7 ] CVE-2016-4276 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276 [ 8 ] CVE-2016-4277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277 [ 9 ] CVE-2016-4278 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278 [ 10 ] CVE-2016-4279 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279 [ 11 ] CVE-2016-4280 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280 [ 12 ] CVE-2016-4281 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281 [ 13 ] CVE-2016-4282 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282 [ 14 ] CVE-2016-4283 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283 [ 15 ] CVE-2016-4284 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284 [ 16 ] CVE-2016-4285 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285 [ 17 ] CVE-2016-4286 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286 [ 18 ] CVE-2016-4287 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287 [ 19 ] CVE-2016-6921 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921 [ 20 ] CVE-2016-6922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922 [ 21 ] CVE-2016-6923 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923 [ 22 ] CVE-2016-6924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924 [ 23 ] CVE-2016-6925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925 [ 24 ] CVE-2016-6926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926 [ 25 ] CVE-2016-6927 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927 [ 26 ] CVE-2016-6929 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929 [ 27 ] CVE-2016-6930 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930 [ 28 ] CVE-2016-6931 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931 [ 29 ] CVE-2016-6932 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932 [ 30 ] CVE-2016-6981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981 [ 31 ] CVE-2016-6982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982 [ 32 ] CVE-2016-6983 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983 [ 33 ] CVE-2016-6984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984 [ 34 ] CVE-2016-6985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985 [ 35 ] CVE-2016-6986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986 [ 36 ] CVE-2016-6987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987 [ 37 ] CVE-2016-6989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989 [ 38 ] CVE-2016-6990 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990 [ 39 ] CVE-2016-6992 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992 [ 40 ] CVE-2016-7855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201610-10
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0453", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "18.0.0.366" }, { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "22.0.0.211" }, { "model": "flash player desktop runtime", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "22.0.0.211" }, { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "11.2.202.632" }, { "model": "flash player", "scope": "eq", "trust": 0.9, "vendor": "adobe", "version": "22.0.0.211" }, { "model": "flash player", "scope": "eq", "trust": 0.9, "vendor": "adobe", "version": "18.0.0.366" }, { "model": "chrome", "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "11.2.202.635 (linux)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "23.0.0.162 (windows 10/8.1 edition microsoft edge/internet explorer 11)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "23.0.0.162 (windows/macintosh/linux/chromeos edition chrome)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "desktop runtime 23.0.0.162 (windows/macintosh)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "continuous support release 18.0.0.375 (windows/macintosh)" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for 32-bit systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for x64-based systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1511 for 32-bit systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1511 for x64-based systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1607 for 32-bit systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1607 for x64-based systems" }, { "model": "windows 8.1", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for 32-bit systems" }, { "model": "windows 8.1", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for x64-based systems" }, { "model": "windows rt 8.1", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "windows server 2012", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "none" }, { "model": "windows server 2012", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "r2" }, { "model": "internet explorer", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "11" }, { "model": "edge", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0235" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0179" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0177" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0176" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0259" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0252" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0214" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0182" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.070" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700275" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700232" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700169" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602105" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502131" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502124" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502118" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.50080" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.400231" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300271" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300270" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300268" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300265" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300257" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300250" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300231" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300214" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.20295" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202425" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202418" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202400" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202359" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202350" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202346" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202341" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202297" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202280" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202238" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202236" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202221" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202197" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202160" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11569" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11554" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11164" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11150" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.198" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.160" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.1129" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.53.64" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.51.66" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.452" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.3218" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.22.87" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.15.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.12.36" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.12.35" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.2460" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.152.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.151.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.124.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.9.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.8.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.48.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.47.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.45.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.31.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.289.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.283.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.280" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.28.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.277.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.262.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.260.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.246.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.159.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.155.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.115.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0.35.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0.34.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.73.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.70.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.69.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.68.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.67.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.66.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.61.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.60.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.53.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.24.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.19.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.14.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "4" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "22.0.0.209" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "22.0.0.192" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.242" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.241" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.226" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.216" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.213" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.197" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.182" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.306" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.286" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.272" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.267" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.235" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.228" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.245" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.226" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.207" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.185" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.360" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.352" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.343" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.333" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.329" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.326" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.324" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.268" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.261" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.255" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.252" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.241" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.233" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.232" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.209" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.204" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.203" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.194" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.161" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.160" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.143" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "17.0.0.188" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "17.0.0.169" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "17.0.0.134" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.305" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.296" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.291" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.287" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.257" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.234" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.246" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.242" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.239" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.223" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.189" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0.0.145" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0.0.125" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.309" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.302" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.296" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.292" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.289" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.281" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.277" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.269" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.264" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.260" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.258" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.250" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.244" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.241" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.231" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.223" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.206" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.201" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.77" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.44" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.43" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.41" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.38" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.9.900.170" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.9.900.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.9.900.117" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.97" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.94" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.170" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.168" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.279" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.272" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.269" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.261" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.260" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.257" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.252" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.242" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.225" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.224" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.203" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.202" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.180" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.171" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.168" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.167" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.149" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.146" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.136" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.135" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.110" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.402.287" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.402.278" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.402.265" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.378.5" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.31.230" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300.273" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.632" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.626" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.621" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.616" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.577" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.569" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.559" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.554" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.548" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.540" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.535" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.521" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.508" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.491" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.481" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.468" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.466" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.460" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.457" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.451" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.442" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.440" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.438" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.429" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.424" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.411" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.406" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.394" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.378" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.356" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.336" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.335" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.332" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.327" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.310" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.291" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.285" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.275" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.273" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.270" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.261" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.258" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.251" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.243" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.238" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.235" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.233" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.229" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.228" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.223" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.81" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.63" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.59" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.58" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.48" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.34" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.112.61" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.9" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.73" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.54" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.5" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.44" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.63" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.62" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.59" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.55" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.228" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.1.153" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.1.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.25" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.24" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.23" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.22" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.21" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.86" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.75" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.68" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.67" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.63" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.61" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.51" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.50" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.5" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.48" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.43" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.4" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.29" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.25" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.23" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.20" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.19" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.18" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.16" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.15" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.34" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.26" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.23" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.22" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.16" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.14" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.159.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.157.51" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.156.12" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.28" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.27" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.25" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.24" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.18" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.13" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.153.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.33" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.32" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.26" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.21" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.95.2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.95.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.92.8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.92.10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.85.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.82.76" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.52.15" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.52.14.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.52.14" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.106.17" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.106.16" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.105.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.102.65" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.102.64" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.42.34" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.32.18" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.2.54" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "23.0.0.162" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.375" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.635" } ], "sources": [ { "db": "BID", "id": "92930" }, { "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "db": "NVD", "id": "CVE-2016-4274" }, { "db": "CNNVD", "id": "CNNVD-201609-288" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.2.202.632", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "cpe_name": [], "versionEndIncluding": "18.0.0.366", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2016-4274" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Mateusz Jurczyk and Natalie Silvanovich of Google Project Zero, b0nd@garage4hackers working with Trend Micro\u0027s Zero Day Initiative, Weizhong Qian of ART\u0026UESTC\u0027s Neklab, Tao Yan (@Ga1ois) of Palo Alto Networks, Yuki Chen of Qihoo 360 Vulcan Team and willJ o", "sources": [ { "db": "BID", "id": "92930" } ], "trust": 0.3 }, "cve": "CVE-2016-4274", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-4274", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-93093", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2016-4274", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-4274", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2016-4274", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-4274", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201609-288", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-93093", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-4274", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-93093" }, { "db": "VULMON", "id": "CVE-2016-4274" }, { "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "db": "NVD", "id": "CVE-2016-4274" }, { "db": "CNNVD", "id": "CNNVD-201609-288" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924. \nAttackers can exploit these issues to execute arbitrary code in the context of the user running the affected applications. Failed exploit attempts will likely cause a denial-of-service condition. The product enables viewing of applications, content and video across screens and browsers. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: flash-plugin security update\nAdvisory ID: RHSA-2016:1865-01\nProduct: Red Hat Enterprise Linux Supplementary\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2016-1865.html\nIssue date: 2016-09-14\nCVE Names: CVE-2016-4271 CVE-2016-4272 CVE-2016-4274 \n CVE-2016-4275 CVE-2016-4276 CVE-2016-4277 \n CVE-2016-4278 CVE-2016-4279 CVE-2016-4280 \n CVE-2016-4281 CVE-2016-4282 CVE-2016-4283 \n CVE-2016-4284 CVE-2016-4285 CVE-2016-4287 \n CVE-2016-6921 CVE-2016-6922 CVE-2016-6923 \n CVE-2016-6924 CVE-2016-6925 CVE-2016-6926 \n CVE-2016-6927 CVE-2016-6929 CVE-2016-6930 \n CVE-2016-6931 CVE-2016-6932 \n=====================================================================\n\n1. Summary:\n\nAn update for flash-plugin is now available for Red Hat Enterprise Linux 5\nSupplementary and Red Hat Enterprise Linux 6 Supplementary. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64\nRed Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64\nRed Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64\n\n3. Description:\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in. \n\nThis update upgrades Flash Player to version 11.2.202.635. These\nvulnerabilities, detailed in the Adobe Security Bulletin listed in the\nReferences section, could allow an attacker to create a specially crafted\nSWF file that would cause flash-plugin to crash, execute arbitrary code, or\ndisclose sensitive information when the victim loaded a page containing the\nmalicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274,\nCVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279,\nCVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284,\nCVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923,\nCVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929,\nCVE-2016-6930, CVE-2016-6931, CVE-2016-6932)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1375725 - flash-plugin: multiple code execution issues fixed in APSB16-29\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 5):\n\ni386:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nRed Hat Enterprise Linux Server Supplementary (v. 5):\n\ni386:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 6):\n\ni386:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nRed Hat Enterprise Linux Server Supplementary (v. 6):\n\ni386:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nRed Hat Enterprise Linux Workstation Supplementary (v. 6):\n\ni386:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-4271\nhttps://access.redhat.com/security/cve/CVE-2016-4272\nhttps://access.redhat.com/security/cve/CVE-2016-4274\nhttps://access.redhat.com/security/cve/CVE-2016-4275\nhttps://access.redhat.com/security/cve/CVE-2016-4276\nhttps://access.redhat.com/security/cve/CVE-2016-4277\nhttps://access.redhat.com/security/cve/CVE-2016-4278\nhttps://access.redhat.com/security/cve/CVE-2016-4279\nhttps://access.redhat.com/security/cve/CVE-2016-4280\nhttps://access.redhat.com/security/cve/CVE-2016-4281\nhttps://access.redhat.com/security/cve/CVE-2016-4282\nhttps://access.redhat.com/security/cve/CVE-2016-4283\nhttps://access.redhat.com/security/cve/CVE-2016-4284\nhttps://access.redhat.com/security/cve/CVE-2016-4285\nhttps://access.redhat.com/security/cve/CVE-2016-4287\nhttps://access.redhat.com/security/cve/CVE-2016-6921\nhttps://access.redhat.com/security/cve/CVE-2016-6922\nhttps://access.redhat.com/security/cve/CVE-2016-6923\nhttps://access.redhat.com/security/cve/CVE-2016-6924\nhttps://access.redhat.com/security/cve/CVE-2016-6925\nhttps://access.redhat.com/security/cve/CVE-2016-6926\nhttps://access.redhat.com/security/cve/CVE-2016-6927\nhttps://access.redhat.com/security/cve/CVE-2016-6929\nhttps://access.redhat.com/security/cve/CVE-2016-6930\nhttps://access.redhat.com/security/cve/CVE-2016-6931\nhttps://access.redhat.com/security/cve/CVE-2016-6932\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://helpx.adobe.com/security/products/flash-player/apsb16-29.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFX2Pp+XlSAg2UNWIIRAp1iAKCmfmh77bYTg10K3b0b6aJuxtLEgACfZlyh\nynwsnFlRoTlOLVQLiobHvps=\n=1fXO\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBackground\n==========\n\nThe Adobe Flash Player is a renderer for the SWF file format, which is\ncommonly used to provide interactive websites. \nPlease review the CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Adobe Flash Player 23.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=www-plugins/adobe-flash-23.0.0.205\"\n\nAll Adobe Flash Player 11.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=www-plugins/adobe-flash-11.2.202.635\"\n\nReferences\n==========\n\n[ 1 ] CVE-2016-4182\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182\n[ 2 ] CVE-2016-4271\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271\n[ 3 ] CVE-2016-4272\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272\n[ 4 ] CVE-2016-4273\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273\n[ 5 ] CVE-2016-4274\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274\n[ 6 ] CVE-2016-4275\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275\n[ 7 ] CVE-2016-4276\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276\n[ 8 ] CVE-2016-4277\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277\n[ 9 ] CVE-2016-4278\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278\n[ 10 ] CVE-2016-4279\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279\n[ 11 ] CVE-2016-4280\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280\n[ 12 ] CVE-2016-4281\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281\n[ 13 ] CVE-2016-4282\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282\n[ 14 ] CVE-2016-4283\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283\n[ 15 ] CVE-2016-4284\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284\n[ 16 ] CVE-2016-4285\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285\n[ 17 ] CVE-2016-4286\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286\n[ 18 ] CVE-2016-4287\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287\n[ 19 ] CVE-2016-6921\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921\n[ 20 ] CVE-2016-6922\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922\n[ 21 ] CVE-2016-6923\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923\n[ 22 ] CVE-2016-6924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924\n[ 23 ] CVE-2016-6925\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925\n[ 24 ] CVE-2016-6926\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926\n[ 25 ] CVE-2016-6927\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927\n[ 26 ] CVE-2016-6929\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929\n[ 27 ] CVE-2016-6930\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930\n[ 28 ] CVE-2016-6931\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931\n[ 29 ] CVE-2016-6932\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932\n[ 30 ] CVE-2016-6981\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981\n[ 31 ] CVE-2016-6982\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982\n[ 32 ] CVE-2016-6983\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983\n[ 33 ] CVE-2016-6984\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984\n[ 34 ] CVE-2016-6985\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985\n[ 35 ] CVE-2016-6986\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986\n[ 36 ] CVE-2016-6987\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987\n[ 37 ] CVE-2016-6989\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989\n[ 38 ] CVE-2016-6990\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990\n[ 39 ] CVE-2016-6992\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992\n[ 40 ] CVE-2016-7855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201610-10\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2016-4274" }, { "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "db": "BID", "id": "92930" }, { "db": "VULHUB", "id": "VHN-93093" }, { "db": "VULMON", "id": "CVE-2016-4274" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-4274", "trust": 3.1 }, { "db": "BID", "id": "92930", "trust": 2.1 }, { "db": "SECTRACK", "id": "1036791", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2016-004734", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201609-288", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-516", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-93093", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-4274", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138714", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "139424", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-93093" }, { "db": "VULMON", "id": "CVE-2016-4274" }, { "db": "BID", "id": "92930" }, { "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" }, { "db": "NVD", "id": "CVE-2016-4274" }, { "db": "CNNVD", "id": "CNNVD-201609-288" } ] }, "id": "VAR-201609-0453", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-93093" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:05:32.243000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APSB16-29", "trust": 0.8, "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "title": "APSB16-29", "trust": 0.8, "url": "https://helpx.adobe.com/jp/security/products/flash-player/apsb16-29.html" }, { "title": "Google Chrome", "trust": 0.8, "url": "https://www.google.com/intl/ja/chrome/browser/features.html" }, { "title": "Chrome Releases", "trust": 0.8, "url": "http://googlechromereleases.blogspot.jp/" }, { "title": "Google Chrome \u3092\u66f4\u65b0\u3059\u308b", "trust": 0.8, "url": "https://support.google.com/chrome/answer/95414?hl=ja" }, { "title": "MS16-117", "trust": 0.8, "url": "https://technet.microsoft.com/en-us/library/security/ms16-117.aspx" }, { "title": "MS16-117", "trust": 0.8, "url": "https://technet.microsoft.com/ja-jp/library/security/ms16-117.aspx" }, { "title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Flash Player \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b", "trust": 0.8, "url": "http://www.fmworld.net/biz/common/adobe/20160915f.html" }, { "title": "Adobe Flash Player Repair measures for memory corruption vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=64103" }, { "title": "Red Hat: CVE-2016-4274", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=cve-2016-4274" }, { "title": "CVE-Study", "trust": 0.1, "url": "https://github.com/thdusdl1219/cve-study " }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/adobe-releases-updates-that-resolve-35-security-vulnerabilities/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-4274" }, { "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "db": "CNNVD", "id": "CNNVD-201609-288" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "CWE-119", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-93093" }, { "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "db": "NVD", "id": "CVE-2016-4274" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "trust": 1.9, "url": "https://security.gentoo.org/glsa/201610-10" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2016-1865.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/92930" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1036791" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4274" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20160914-adobeflashplayer.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2016/at160034.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4274" }, { "trust": 0.3, "url": "https://www.adobe.com/software/flash/about/" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-16-516/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4278" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4287" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4271" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4280" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4281" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4277" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4285" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6926" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6921" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6927" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4276" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6930" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6923" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6929" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4282" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4283" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6922" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6924" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6931" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4274" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4279" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4284" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6925" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4272" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4275" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=48898" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4284" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6924" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4278" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4279" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4271" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4272" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4275" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6931" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4277" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4276" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6922" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6932" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4287" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6932" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4283" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4281" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6921" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6925" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6930" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4280" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4274" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6927" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6926" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6923" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4285" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6929" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4282" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4279" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4284" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4182" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6921" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4282" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4276" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6987" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6931" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6985" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6930" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6925" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6989" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4286" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6984" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4281" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6923" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6992" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7855" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6986" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4275" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6982" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6981" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4274" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6924" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4278" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6932" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6990" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4271" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6926" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4280" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4283" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6983" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4285" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4273" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4273" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4182" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6929" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6922" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6927" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4272" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4277" } ], "sources": [ { "db": "VULHUB", "id": "VHN-93093" }, { "db": "VULMON", "id": "CVE-2016-4274" }, { "db": "BID", "id": "92930" }, { "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" }, { "db": "NVD", "id": "CVE-2016-4274" }, { "db": "CNNVD", "id": "CNNVD-201609-288" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-93093" }, { "db": "VULMON", "id": "CVE-2016-4274" }, { "db": "BID", "id": "92930" }, { "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" }, { "db": "NVD", "id": "CVE-2016-4274" }, { "db": "CNNVD", "id": "CNNVD-201609-288" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-14T00:00:00", "db": "VULHUB", "id": "VHN-93093" }, { "date": "2016-09-14T00:00:00", "db": "VULMON", "id": "CVE-2016-4274" }, { "date": "2016-09-13T00:00:00", "db": "BID", "id": "92930" }, { "date": "2016-09-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "date": "2016-09-14T16:51:57", "db": "PACKETSTORM", "id": "138714" }, { "date": "2016-10-30T22:14:44", "db": "PACKETSTORM", "id": "139424" }, { "date": "2016-09-14T18:59:03.217000", "db": "NVD", "id": "CVE-2016-4274" }, { "date": "2016-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-288" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-05T00:00:00", "db": "VULHUB", "id": "VHN-93093" }, { "date": "2022-11-14T00:00:00", "db": "VULMON", "id": "CVE-2016-4274" }, { "date": "2016-09-13T00:00:00", "db": "BID", "id": "92930" }, { "date": "2016-09-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004734" }, { "date": "2022-11-14T19:34:30.300000", "db": "NVD", "id": "CVE-2016-4274" }, { "date": "2022-11-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-288" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "139424" }, { "db": "CNNVD", "id": "CNNVD-201609-288" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Flash Player Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004734" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201609-288" } ], "trust": 0.6 } }
gsd-2016-4274
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-4274", "description": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "id": "GSD-2016-4274", "references": [ "https://www.suse.com/security/cve/CVE-2016-4274.html", "https://access.redhat.com/errata/RHSA-2016:1865", "https://advisories.mageia.org/CVE-2016-4274.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-4274" ], "details": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "id": "GSD-2016-4274", "modified": "2023-12-13T01:21:18.835295Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2016-4274", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201610-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-10" }, { "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "RHSA-2016:1865", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "name": "92930", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92930" }, { "name": "1036791", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036791" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.2.202.632", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "cpe_name": [], "versionEndIncluding": "18.0.0.366", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2016-4274" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "92930", "refsource": "BID", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92930" }, { "name": "GLSA-201610-10", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201610-10" }, { "name": "1036791", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036791" }, { "name": "RHSA-2016:1865", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2022-11-14T19:34Z", "publishedDate": "2016-09-14T18:59Z" } } }
rhsa-2016_1865
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 11.2.202.635.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1865", "url": "https://access.redhat.com/errata/RHSA-2016:1865" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "category": "external", "summary": "1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1865.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2024-11-05T19:28:08+00:00", "generator": { "date": "2024-11-05T19:28:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2016:1865", "initial_release_date": "2016-09-14T07:14:02+00:00", "revision_history": [ { "date": "2016-09-14T07:14:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-14T07:14:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T19:28:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product_id": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.635-1.el6_8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product_id": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.635-1.el5_11?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "relates_to_product_reference": "5Client-Supplementary-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "relates_to_product_reference": "5Server-Supplementary-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Client-Supplementary-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Server-Supplementary-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.8.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4271", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4277 and CVE-2016-4278, aka a \"local-with-filesystem Flash sandbox bypass\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4271" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4271", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4271" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4272", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4272" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4272", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4272" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4274", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4274" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4274", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4274" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4275", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4275" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4275", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4275" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4276", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4276" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4276", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4276" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4276", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4276" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4277", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4278.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4277" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4277", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4277" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4277", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4277" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4278", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4277.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4278" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4278", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4278" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4278", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4278" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4279", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4279" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4279", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4279" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4279", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4279" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4280", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4280" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4280", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4280" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4281", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4281" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4281", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4281" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4282", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4282" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4282", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4282" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4282", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4282" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4283", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4283" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4283", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4283" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4284", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4284" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4284", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4284" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4285", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4285" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4285", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4285" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4287", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4287" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4287", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4287" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6921", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6921" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6921", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6921" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6922", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6922" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6922", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6922" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6922", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6922" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6923", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6923" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6923", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6923" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6924", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6922.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6924" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6924", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6924" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6924", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6924" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6925", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6925" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6925", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6925" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6926", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6926" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6926", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6926" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6926", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6926" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6927", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6927" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6927", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6927" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6927", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6927" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6929", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6929" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6929", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6929" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6930", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6930" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6930", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6930" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6931", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6931" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6931", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6931" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6932", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6931.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6932" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6932", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6932" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.