Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-4935 (GCVE-0-2018-4935)
Vulnerability from cvelistv5 – Published: 2018-05-19 17:00 – Updated: 2024-08-05 05:18- Out-of-bounds write
| URL | Tags |
|---|---|
| https://www.exploit-db.com/exploits/44527/ | exploitx_refsource_EXPLOIT-DB |
| http://www.securityfocus.com/bid/103708 | vdb-entryx_refsource_BID |
| https://access.redhat.com/errata/RHSA-2018:1119 | vendor-advisoryx_refsource_REDHAT |
| http://www.securitytracker.com/id/1040648 | vdb-entryx_refsource_SECTRACK |
| https://security.gentoo.org/glsa/201804-11 | vendor-advisoryx_refsource_GENTOO |
| https://helpx.adobe.com/security/products/flash-p… | x_refsource_MISC |
| Vendor | Product | Version | |
|---|---|---|---|
| n/a | Adobe Flash Player 29.0.0.113 and earlier versions |
Affected:
Adobe Flash Player 29.0.0.113 and earlier versions
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:18:26.981Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "44527",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/44527/"
},
{
"name": "103708",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "RHSA-2018:1119",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "GLSA-201804-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Adobe Flash Player 29.0.0.113 and earlier versions",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Adobe Flash Player 29.0.0.113 and earlier versions"
}
]
}
],
"datePublic": "2018-05-19T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out-of-bounds write",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-21T09:57:02.000Z",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "44527",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/44527/"
},
{
"name": "103708",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "RHSA-2018:1119",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "GLSA-201804-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2018-4935",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Adobe Flash Player 29.0.0.113 and earlier versions",
"version": {
"version_data": [
{
"version_value": "Adobe Flash Player 29.0.0.113 and earlier versions"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-bounds write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "44527",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44527/"
},
{
"name": "103708",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "RHSA-2018:1119",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "GLSA-201804-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2018-4935",
"datePublished": "2018-05-19T17:00:00.000Z",
"dateReserved": "2018-01-03T00:00:00.000Z",
"dateUpdated": "2024-08-05T05:18:26.981Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2018-4935",
"date": "2026-05-11",
"epss": "0.74021",
"percentile": "0.98852"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"29.0.0.113\", \"matchCriteriaId\": \"E5278C46-1C86-41FF-AE07-FB960DDA5251\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*\", \"versionEndIncluding\": \"29.0.0.113\", \"matchCriteriaId\": \"EE872A2B-4118-419A-8B2A-1486BFE1F48A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*\", \"versionEndIncluding\": \"29.0.0.113\", \"matchCriteriaId\": \"7531B60E-06FF-4F9C-90E0-71B8637D5CF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*\", \"versionEndIncluding\": \"29.0.0.113\", \"matchCriteriaId\": \"C58710D1-1B89-494D-8675-68A93C0ACD37\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21540673-614A-4D40-8BD7-3F07723803B0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E93068DB-549B-45AB-8E5C-00EB5D8B5CF8\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\"}, {\"lang\": \"es\", \"value\": \"Adobe Flash Player, en versiones 29.0.0.113 y anteriores, tiene una vulnerabilidad explotable de escritura fuera de l\\u00edmites. Su explotaci\\u00f3n con \\u00e9xito podr\\u00eda permitir la ejecuci\\u00f3n arbitraria de c\\u00f3digo en el contexto del usuario actual.\"}]",
"id": "CVE-2018-4935",
"lastModified": "2024-11-21T04:07:44.623",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2018-05-19T17:29:01.307",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/103708\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1040648\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1119\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://helpx.adobe.com/security/products/flash-player/apsb18-08.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201804-11\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/44527/\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securityfocus.com/bid/103708\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1040648\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Broken Link\", \"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2018:1119\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://helpx.adobe.com/security/products/flash-player/apsb18-08.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201804-11\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://www.exploit-db.com/exploits/44527/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\", \"VDB Entry\"]}]",
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-4935\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2018-05-19T17:29:01.307\",\"lastModified\":\"2024-11-21T04:07:44.623\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\"},{\"lang\":\"es\",\"value\":\"Adobe Flash Player, en versiones 29.0.0.113 y anteriores, tiene una vulnerabilidad explotable de escritura fuera de l\u00edmites. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir la ejecuci\u00f3n arbitraria de c\u00f3digo en el contexto del usuario actual.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"29.0.0.113\",\"matchCriteriaId\":\"E5278C46-1C86-41FF-AE07-FB960DDA5251\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*\",\"versionEndIncluding\":\"29.0.0.113\",\"matchCriteriaId\":\"EE872A2B-4118-419A-8B2A-1486BFE1F48A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*\",\"versionEndIncluding\":\"29.0.0.113\",\"matchCriteriaId\":\"7531B60E-06FF-4F9C-90E0-71B8637D5CF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*\",\"versionEndIncluding\":\"29.0.0.113\",\"matchCriteriaId\":\"C58710D1-1B89-494D-8675-68A93C0ACD37\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21540673-614A-4D40-8BD7-3F07723803B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93068DB-549B-45AB-8E5C-00EB5D8B5CF8\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103708\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040648\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1119\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb18-08.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201804-11\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44527/\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/103708\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1119\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb18-08.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201804-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44527/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}"
}
}
GHSA-QHVP-MP3M-7XHP
Vulnerability from github – Published: 2022-05-14 01:27 – Updated: 2022-05-14 01:27Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
{
"affected": [],
"aliases": [
"CVE-2018-4935"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-05-19T17:29:00Z",
"severity": "CRITICAL"
},
"details": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"id": "GHSA-qhvp-mp3m-7xhp",
"modified": "2022-05-14T01:27:45Z",
"published": "2022-05-14T01:27:45Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"type": "WEB",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/44527"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/103708"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1040648"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2018-4935
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-4935",
"description": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"id": "GSD-2018-4935",
"references": [
"https://access.redhat.com/errata/RHSA-2018:1119",
"https://packetstormsecurity.com/files/cve/CVE-2018-4935"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-4935"
],
"details": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"id": "GSD-2018-4935",
"modified": "2023-12-13T01:22:28.477434Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2018-4935",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Adobe Flash Player 29.0.0.113 and earlier versions",
"version": {
"version_data": [
{
"version_value": "Adobe Flash Player 29.0.0.113 and earlier versions"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-bounds write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "44527",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44527/"
},
{
"name": "103708",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "RHSA-2018:1119",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "GLSA-201804-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe_name": [],
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe_name": [],
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe_name": [],
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2018-4935"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"name": "44527",
"refsource": "EXPLOIT-DB",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44527/"
},
{
"name": "RHSA-2018:1119",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "103708",
"refsource": "BID",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "GLSA-201804-11",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201804-11"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-11-18T17:17Z",
"publishedDate": "2018-05-19T17:29Z"
}
}
}
FKIE_CVE-2018-4935
Vulnerability from fkie_nvd - Published: 2018-05-19 17:29 - Updated: 2024-11-21 04:07| Vendor | Product | Version | |
|---|---|---|---|
| adobe | flash_player_desktop_runtime | * | |
| apple | mac_os_x | - | |
| linux | linux_kernel | - | |
| microsoft | windows | - | |
| adobe | flash_player | * | |
| apple | mac_os_x | - | |
| chrome_os | - | ||
| linux | linux_kernel | - | |
| microsoft | windows | - | |
| adobe | flash_player | * | |
| adobe | flash_player | * | |
| microsoft | windows_10 | - | |
| microsoft | windows_8.1 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5278C46-1C86-41FF-AE07-FB960DDA5251",
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"matchCriteriaId": "EE872A2B-4118-419A-8B2A-1486BFE1F48A",
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"matchCriteriaId": "7531B60E-06FF-4F9C-90E0-71B8637D5CF0",
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"matchCriteriaId": "C58710D1-1B89-494D-8675-68A93C0ACD37",
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
},
{
"lang": "es",
"value": "Adobe Flash Player, en versiones 29.0.0.113 y anteriores, tiene una vulnerabilidad explotable de escritura fuera de l\u00edmites. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir la ejecuci\u00f3n arbitraria de c\u00f3digo en el contexto del usuario actual."
}
],
"id": "CVE-2018-4935",
"lastModified": "2024-11-21T04:07:44.623",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-05-19T17:29:01.307",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44527/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44527/"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2018-09032
Vulnerability from cnvd - Published: 2018-05-07厂商已发布了漏洞修复程序,请及时关注更新: https://helpx.adobe.com/security/products/flash-player/apsb18-08.html
| Name | Adobe Flash Player |
|---|
{
"bids": {
"bid": {
"bidNumber": "103708"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-4935"
}
},
"description": "Adobe Flash Player\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u8de8\u5c4f\u5e55\u548c\u6d4f\u89c8\u5668\u67e5\u770b\u5e94\u7528\u7a0b\u5e8f\u3001\u5185\u5bb9\u548c\u89c6\u9891\u3002\r\n\r\nAdobe Flash Player\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff08\u8d8a\u754c\u5199\u5165\uff09\u3002",
"discovererName": "Mateusz Jurczyk and Natalie Silvanovich of Google Project Zero, willJ of Tencent PC Manager, and Lin Wang of Beihang University",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-09032",
"openTime": "2018-05-07",
"patchDescription": "Adobe Flash Player\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u8de8\u5c4f\u5e55\u548c\u6d4f\u89c8\u5668\u67e5\u770b\u5e94\u7528\u7a0b\u5e8f\u3001\u5185\u5bb9\u548c\u89c6\u9891\u3002\r\n\r\nAdobe Flash Player\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff08\u8d8a\u754c\u5199\u5165\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Adobe Flash Player\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2018-09032\uff09\u7684\u8865\u4e01",
"products": {
"product": "Adobe Flash Player"
},
"referenceLink": "https://securitytracker.com/id/1040648",
"serverity": "\u9ad8",
"submitTime": "2018-04-11",
"title": "Adobe Flash Player\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2018-09032\uff09"
}
RHSA-2018:1119
Vulnerability from csaf_redhat - Published: 2018-04-11 21:25 - Updated: 2026-01-08 11:27No description is available for this CVE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
No description is available for this CVE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
No description is available for this CVE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
No description is available for this CVE.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 29.0.0.140.\n\nSecurity Fix(es):\n\n* flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) (CVE-2018-4932, CVE-2018-4935, CVE-2018-4937)\n\n* flash-plugin: Information Disclosure vulnerabilities (APSB18-08) (CVE-2018-4933, CVE-2018-4934, CVE-2018-4936)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1119",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"category": "external",
"summary": "1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1119.json"
}
],
"title": "Red Hat Security Advisory: flash-plugin security update",
"tracking": {
"current_release_date": "2026-01-08T11:27:26+00:00",
"generator": {
"date": "2026-01-08T11:27:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.14"
}
},
"id": "RHSA-2018:1119",
"initial_release_date": "2018-04-11T21:25:45+00:00",
"revision_history": [
{
"date": "2018-04-11T21:25:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-11T21:25:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-08T11:27:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_id": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@29.0.0.140-1.el6_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Client-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Server-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.9.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-4932",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4932"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4933",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4933"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4934",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4934"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4935",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4935"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4936",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4936"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4937",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4937"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4937",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
}
]
}
RHSA-2018_1119
Vulnerability from csaf_redhat - Published: 2018-04-11 21:25 - Updated: 2024-11-15 02:06Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 29.0.0.140.\n\nSecurity Fix(es):\n\n* flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) (CVE-2018-4932, CVE-2018-4935, CVE-2018-4937)\n\n* flash-plugin: Information Disclosure vulnerabilities (APSB18-08) (CVE-2018-4933, CVE-2018-4934, CVE-2018-4936)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1119",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"category": "external",
"summary": "1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1119.json"
}
],
"title": "Red Hat Security Advisory: flash-plugin security update",
"tracking": {
"current_release_date": "2024-11-15T02:06:55+00:00",
"generator": {
"date": "2024-11-15T02:06:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1119",
"initial_release_date": "2018-04-11T21:25:45+00:00",
"revision_history": [
{
"date": "2018-04-11T21:25:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-11T21:25:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T02:06:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_id": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@29.0.0.140-1.el6_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Client-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Server-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.9.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-4932",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4932"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4933",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4933"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4934",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4934"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4935",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4935"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4936",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4936"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4937",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4937"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4937",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
}
]
}
CERTFR-2018-AVI-176
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Adobe. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Adobe | N/A | Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions 29.0.0.113 et antérieures sur Windows 10 et 8.1 | ||
| Adobe | N/A | Adobe Flash Player Desktop Runtime versions 29.0.0.113 et antérieures sur Windows, Macintosh et Linux | ||
| Adobe | ColdFusion | ColdFusion versions 11 Update 13 et antérieures | ||
| Adobe | ColdFusion | ColdFusion versions (2016 release) Update 5 et antérieures | ||
| Adobe | N/A | Adobe Flash Player pour Google Chrome versions 29.0.0.113 et antérieures sur Windows, Macintosh, Linux et Chrome OS |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions 29.0.0.113 et ant\u00e9rieures sur Windows 10 et 8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player Desktop Runtime versions 29.0.0.113 et ant\u00e9rieures sur Windows, Macintosh et Linux",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "ColdFusion versions 11 Update 13 et ant\u00e9rieures",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "ColdFusion versions (2016 release) Update 5 et ant\u00e9rieures",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player pour Google Chrome versions 29.0.0.113 et ant\u00e9rieures sur Windows, Macintosh, Linux et Chrome OS",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-4942",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4942"
},
{
"name": "CVE-2018-4938",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4938"
},
{
"name": "CVE-2018-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4932"
},
{
"name": "CVE-2018-4939",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4939"
},
{
"name": "CVE-2018-4941",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4941"
},
{
"name": "CVE-2018-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4935"
},
{
"name": "CVE-2018-4940",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4940"
},
{
"name": "CVE-2018-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4934"
},
{
"name": "CVE-2018-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4933"
},
{
"name": "CVE-2018-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4936"
},
{
"name": "CVE-2018-4937",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4937"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-176",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB18-08 du 10 avril 2018",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB18-14 du 10 avril 2018",
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb18-14.html"
}
]
}
CERTFR-2018-AVI-176
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Adobe. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Adobe | N/A | Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions 29.0.0.113 et antérieures sur Windows 10 et 8.1 | ||
| Adobe | N/A | Adobe Flash Player Desktop Runtime versions 29.0.0.113 et antérieures sur Windows, Macintosh et Linux | ||
| Adobe | ColdFusion | ColdFusion versions 11 Update 13 et antérieures | ||
| Adobe | ColdFusion | ColdFusion versions (2016 release) Update 5 et antérieures | ||
| Adobe | N/A | Adobe Flash Player pour Google Chrome versions 29.0.0.113 et antérieures sur Windows, Macintosh, Linux et Chrome OS |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions 29.0.0.113 et ant\u00e9rieures sur Windows 10 et 8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player Desktop Runtime versions 29.0.0.113 et ant\u00e9rieures sur Windows, Macintosh et Linux",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "ColdFusion versions 11 Update 13 et ant\u00e9rieures",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "ColdFusion versions (2016 release) Update 5 et ant\u00e9rieures",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player pour Google Chrome versions 29.0.0.113 et ant\u00e9rieures sur Windows, Macintosh, Linux et Chrome OS",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-4942",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4942"
},
{
"name": "CVE-2018-4938",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4938"
},
{
"name": "CVE-2018-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4932"
},
{
"name": "CVE-2018-4939",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4939"
},
{
"name": "CVE-2018-4941",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4941"
},
{
"name": "CVE-2018-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4935"
},
{
"name": "CVE-2018-4940",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4940"
},
{
"name": "CVE-2018-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4934"
},
{
"name": "CVE-2018-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4933"
},
{
"name": "CVE-2018-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4936"
},
{
"name": "CVE-2018-4937",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4937"
}
],
"links": [],
"reference": "CERTFR-2018-AVI-176",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB18-08 du 10 avril 2018",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB18-14 du 10 avril 2018",
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb18-14.html"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.