FKIE_CVE-2013-0630

Vulnerability from fkie_nvd - Published: 2013-01-11 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors.
Impacted products
Vendor Product Version
adobe flash_player *
adobe flash_player 10.3.181.14
adobe flash_player 10.3.181.16
adobe flash_player 10.3.181.22
adobe flash_player 10.3.181.23
adobe flash_player 10.3.181.26
adobe flash_player 10.3.181.34
adobe flash_player 10.3.183.5
adobe flash_player 10.3.183.7
adobe flash_player 10.3.183.10
adobe flash_player 10.3.183.11
adobe flash_player 10.3.183.15
adobe flash_player 10.3.183.16
adobe flash_player 10.3.183.18
adobe flash_player 10.3.183.19
adobe flash_player 10.3.183.20
adobe flash_player 10.3.183.23
adobe flash_player 10.3.183.25
adobe flash_player 10.3.183.29
adobe flash_player 10.3.183.43
apple mac_os_x *
linux linux_kernel *
microsoft windows *
adobe flash_player *
adobe flash_player 11.5.502.110
adobe flash_player 11.5.502.135
apple mac_os_x *
microsoft windows *
adobe flash_player *
adobe flash_player 11.2.202.223
adobe flash_player 11.2.202.228
adobe flash_player 11.2.202.233
adobe flash_player 11.2.202.235
adobe flash_player 11.2.202.236
adobe flash_player 11.2.202.238
adobe flash_player 11.2.202.243
linux linux_kernel *
adobe flash_player_for_android *
adobe flash_player_for_android 11.1.115.6
adobe flash_player_for_android 11.1.115.7
adobe flash_player_for_android 11.1.115.8
adobe flash_player_for_android 11.1.115.11
adobe flash_player_for_android 11.1.115.12
adobe flash_player_for_android 11.1.115.17
adobe flash_player_for_android 11.1.115.20
adobe flash_player_for_android 11.1.115.27
google android 4.0
google android 4.0.1
google android 4.0.2
google android 4.0.3
google android 4.0.4
google android 4.1
google android 4.2
adobe flash_player_for_android *
adobe flash_player_for_android 11.0.1.153
adobe flash_player_for_android 11.1.102.59
adobe flash_player_for_android 11.1.111.5
adobe flash_player_for_android 11.1.111.6
adobe flash_player_for_android 11.1.111.7
adobe flash_player_for_android 11.1.111.8
adobe flash_player_for_android 11.1.111.9
adobe flash_player_for_android 11.1.111.10
adobe flash_player_for_android 11.1.111.16
adobe flash_player_for_android 11.1.111.19
adobe flash_player_for_android 11.1.111.24
google android 2.0
google android 2.0.1
google android 2.1
google android 2.2
google android 2.2
google android 2.2.1
google android 2.2.2
google android 2.2.3
google android 2.3
google android 2.3
google android 2.3.1
google android 2.3.2
google android 2.3.3
google android 2.3.4
google android 2.3.5
google android 2.3.6
google android 2.3.7
google android 3.0
google android 3.1
google android 3.2
google android 3.2.1
google android 3.2.2
google android 3.2.4
google android 3.2.6
adobe adobe_air *
adobe adobe_air 3.5.0.600
adobe adobe_air 3.5.0.880
adobe adobe_air_sdk *
adobe adobe_air_sdk 3.5.0.600
adobe adobe_air_sdk 3.5.0.880

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "777CB526-C6E2-4245-84AF-04B345861E6E",
              "versionEndIncluding": "10.3.183.48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4011899D-C2A3-463F-9C1A-A3478CA467B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "330104CE-F418-4F6F-833E-725AF862BEB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A148CC5B-60B5-4098-AE1C-75349E50D301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C2E61C2-6640-43AC-B435-17DD1DD68C47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "457D9876-959D-40A6-9B7A-6FA2C526F224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA540D54-40C3-4C0B-9BF4-CB0B3FF22F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F86D2BF-E3D5-4F7B-931D-02C44AA9B61A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "78C73959-8BDF-45F1-B453-DEF20C75DC8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7081373-1693-4412-8B35-B594DE7EED64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "46ADCE2B-03B1-45A8-A6F0-88369C314473",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "9143B30C-28AD-4844-92C9-65445B4A2050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD017D9-3C1D-4E50-A0A4-DDC205ED0859",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C80FBFB-7562-4574-A0A9-33E0F5B46065",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "E60C0475-10A5-44DD-9E7B-CA17A5BAB5FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8578EF3-9AAA-4E03-A74A-6973265427B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B67A163-6F07-43F3-8C2F-BEE69B0EBF12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "74E1F5D3-7DBA-400A-A335-54C22EFF8796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C055FA74-E573-4C82-BAEA-17BD3032DA42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:10.3.183.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "555E97A6-F1BA-4A7D-AD0C-DB737D16500B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E0EB75-6B39-429C-957F-67234FD1D136",
              "versionEndIncluding": "11.5.502.136",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.110:*:*:*:*:*:*:*",
              "matchCriteriaId": "2641F2EC-F514-47F9-845F-8DBF41CE268F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:11.5.502.135:*:*:*:*:*:*:*",
              "matchCriteriaId": "92AD164C-A1C7-4E3A-A16F-E49BBB74A80A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "308B155D-8C66-4853-A1E8-573D87176C84",
              "versionEndIncluding": "11.2.202.258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.223:*:*:*:*:*:*:*",
              "matchCriteriaId": "146E1EAC-B9AF-4511-A0DC-A048428E3B68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.228:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AFBB9EA-1A66-4FBC-BF89-7DF04FDD6788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.233:*:*:*:*:*:*:*",
              "matchCriteriaId": "39065E60-3680-4384-95C0-EF4F874D2400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.235:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B0603B3-5C98-422D-A49D-EBE1798DAE69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.236:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC7882D-1577-4CEA-B1C0-0FEBC91A441A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.238:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED86796-B721-49B1-A021-82FA769FA024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:11.2.202.243:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF7843C6-628A-4091-8A09-6E126A89870E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F92764B-9428-48EA-8498-13F25CF583B8",
              "versionEndIncluding": "11.1.115.34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C7A3D1-0F5E-447E-B6E2-E0144AD2E123",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEB00E81-9DD9-4652-A758-39CA040257D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BC133FD-F856-4039-8981-81D42B355CE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC1D9DF-A32F-4514-8425-516FB19631EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD2501F-C071-4C27-9BA5-440A13F2EAA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B81AAB75-C6A9-4772-8E55-0A16B7C3C151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2948D0F-39E5-48F1-80CA-E50A7BFA66D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.115.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0FDD57-C951-40DE-A7C8-BCD04EBB5C7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14E1C39-6242-4D12-8AD4-26867392CF44",
              "versionEndIncluding": "11.1.111.29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.0.1.153:*:*:*:*:*:*:*",
              "matchCriteriaId": "8097D00F-452A-4103-A443-8D218768680E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "47D6CD90-E088-4291-9241-3D2CCA7CE0E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "467151E5-6B25-4CC9-BA26-4403F74416F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "26010AE4-79C7-4350-BF05-EA8773D279A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5C9764E-7AFD-466A-B802-0CB4A5FFAD2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8360D0F0-F284-4653-9428-D8B644E0F21E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B5C925-34CB-4413-8DA0-2DBA375D628B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "19684437-4997-444F-A356-02EB82AE33F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FECBDC1-34B4-483A-B844-7A930562F4D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "89030595-DD01-42BF-BECD-370CCD7BFD36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:flash_player_for_android:11.1.111.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E3365E-2D70-495A-8309-557EA9FAD814",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4685EA90-1E01-4FFB-AE31-91FD5D69E2D8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "938DC86D-C783-4EFA-9AB6-3ADC8CD7BB41",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
              "matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB959DB-AFE7-4667-9662-949ADAB81CE3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "18669EEC-ABB9-4CE4-8C0E-A88BE08EC368",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
              "matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "83AB2497-59DE-4253-A758-A3D03FAEB913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E197EC0-82DF-49D5-BD1A-7EA22EC0B806",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E6F4DF-F80F-4A9B-871E-155C0D3DD449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC08431-C70E-4964-B7C0-C9C45F70DCD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:2.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A2A79C6-A7BD-46C2-8320-B9652135F3BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FD2E59-59BF-4611-B65B-A2981127CAC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "86BFE05E-9749-43AA-8DB6-E2F13C2E1759",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DCE4AD-D629-4F0B-AFA8-6CAD061D5FA6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DAAB25F-26E4-4493-B3DA-F87240633031",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "96CD6B49-B9D4-493E-902D-B4EF48260BB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB73EBA4-A9BE-4C40-9E6D-649E89D2C3F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F8205F-2B68-4F1D-B417-76C1AB99FDFA",
              "versionEndIncluding": "3.5.0.890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.600:*:*:*:*:*:*:*",
              "matchCriteriaId": "3526BEB1-0EB0-495F-A28F-D0C6189C0EA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:adobe_air:3.5.0.880:*:*:*:*:*:*:*",
              "matchCriteriaId": "D44932EC-5BFD-4586-8D47-CC4446599C20",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACC36DC-87D2-442A-8D70-8AE467738A8C",
              "versionEndIncluding": "3.5.0.890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.600:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7F4A73A-DE76-41D5-BDA9-271699ABA0F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:adobe:adobe_air_sdk:3.5.0.880:*:*:*:*:*:*:*",
              "matchCriteriaId": "250E6F08-06DD-481E-B8DA-20DD3E69E498",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Adobe Flash Player before 10.3.183.50 and 11.x before 11.5.502.146 on Windows and Mac OS X, before 10.3.183.50 and 11.x before 11.2.202.261 on Linux, before 11.1.111.31 on Android 2.x and 3.x, and before 11.1.115.36 on Android 4.x; Adobe AIR before 3.5.0.1060; and Adobe AIR SDK before 3.5.0.1060 allows attackers to execute arbitrary code via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en Adobe Flash Player anteriores a v10.3.183.50 y 11.x anteriores a v11.5.502.146 en Windows y Mac OS X, anteriores a v10.3.183.50 y 11.x anteriores a v11.2.202.261 en Linux, anteriores a v11.1.111.31 en Android 2.x y 3.x, y anteriores a v11.1.115.36 en Android 4.x; Adobe AIR anteriores a v3.5.0.1060; y Adobe AIR SDK anteriores a v3.5.0.1060 permite a atacantes remotos a ejecutar c\u00f3digo a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2013-0630",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-11T22:55:01.400",
  "references": [
    {
      "source": "psirt@adobe.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html"
    },
    {
      "source": "psirt@adobe.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html"
    },
    {
      "source": "psirt@adobe.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html"
    },
    {
      "source": "psirt@adobe.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html"
    },
    {
      "source": "psirt@adobe.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html"
    },
    {
      "source": "psirt@adobe.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html"
    },
    {
      "source": "psirt@adobe.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00059.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00084.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-0149.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.adobe.com/support/security/bulletins/apsb13-01.html"
    }
  ],
  "sourceIdentifier": "psirt@adobe.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…