CVE-2011-0609

Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.
References
Link Resource
http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html Broken Link
http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html Mailing List Third Party Advisory
http://secunia.com/advisories/43751 Broken Link
http://secunia.com/advisories/43757 Broken Link
http://secunia.com/advisories/43772 Broken Link
http://secunia.com/advisories/43856 Broken Link
http://securityreason.com/securityalert/8152 Broken Link
http://www.adobe.com/support/security/advisories/apsa11-01.html Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb11-06.html Not Applicable
http://www.kb.cert.org/vuls/id/192052 Third Party Advisory US Government Resource
http://www.redhat.com/support/errata/RHSA-2011-0372.html Broken Link
http://www.securityfocus.com/bid/46860 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025210 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025211 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025238 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0655 Broken Link
http://www.vupen.com/english/advisories/2011/0656 Broken Link
http://www.vupen.com/english/advisories/2011/0688 Broken Link
http://www.vupen.com/english/advisories/2011/0732 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/66078 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14147 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14147 Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/66078 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0732 Broken Link
http://www.vupen.com/english/advisories/2011/0688 Broken Link
http://www.vupen.com/english/advisories/2011/0656 Broken Link
http://www.vupen.com/english/advisories/2011/0655 Broken Link
http://www.securitytracker.com/id?1025238 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025211 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025210 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/46860 Broken Link Third Party Advisory VDB Entry
http://www.redhat.com/support/errata/RHSA-2011-0372.html Broken Link
http://www.kb.cert.org/vuls/id/192052 Third Party Advisory US Government Resource
http://www.adobe.com/support/security/bulletins/apsb11-06.html Not Applicable
http://www.adobe.com/support/security/advisories/apsa11-01.html Vendor Advisory
http://securityreason.com/securityalert/8152 Broken Link
http://secunia.com/advisories/43856 Broken Link
http://secunia.com/advisories/43772 Broken Link
http://secunia.com/advisories/43757 Broken Link
http://secunia.com/advisories/43751 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html Mailing List Third Party Advisory
http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html Third Party Advisory
http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html Broken Link
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

20 Dec 2024, 14:46

Type Values Removed Values Added
References (VUPEN) http://www.vupen.com/english/advisories/2011/0655 - Broken Link () http://www.vupen.com/english/advisories/2011/0655 - Broken Link
References (BID) http://www.securityfocus.com/bid/46860 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/46860 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id?1025210 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1025210 - Broken Link, Third Party Advisory, VDB Entry
References (SREASON) http://securityreason.com/securityalert/8152 - Broken Link () http://securityreason.com/securityalert/8152 - Broken Link
References (CONFIRM) http://www.adobe.com/support/security/advisories/apsa11-01.html - Vendor Advisory () http://www.adobe.com/support/security/advisories/apsa11-01.html - Vendor Advisory
References (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb11-06.html - Not Applicable () http://www.adobe.com/support/security/bulletins/apsb11-06.html - Not Applicable
References (SECUNIA) http://secunia.com/advisories/43772 - Broken Link () http://secunia.com/advisories/43772 - Broken Link
References (SECUNIA) http://secunia.com/advisories/43751 - Broken Link () http://secunia.com/advisories/43751 - Broken Link
References (MISC) http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html - Third Party Advisory () http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14147 - Broken Link () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14147 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0372.html - Broken Link () http://www.redhat.com/support/errata/RHSA-2011-0372.html - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2011/0688 - Broken Link () http://www.vupen.com/english/advisories/2011/0688 - Broken Link
References (SECUNIA) http://secunia.com/advisories/43757 - Broken Link () http://secunia.com/advisories/43757 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2011/0656 - Broken Link () http://www.vupen.com/english/advisories/2011/0656 - Broken Link
References (SECTRACK) http://www.securitytracker.com/id?1025211 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1025211 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id?1025238 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1025238 - Broken Link, Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2011/0732 - Broken Link () http://www.vupen.com/english/advisories/2011/0732 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - Mailing List, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/43856 - Broken Link () http://secunia.com/advisories/43856 - Broken Link
References (CERT-VN) http://www.kb.cert.org/vuls/id/192052 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/192052 - Third Party Advisory, US Government Resource
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/66078 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/66078 - Third Party Advisory, VDB Entry
References (CONFIRM) http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html - Broken Link () http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html - Broken Link

28 Jun 2024, 14:20

Type Values Removed Values Added
First Time Google chrome
Opensuse opensuse
Apple macos
Adobe air
Opensuse
Google chrome Os
Suse linux Enterprise
Suse
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 7.8
CPE cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*
cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0372.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0372.html - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/66078 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/66078 - Third Party Advisory, VDB Entry
References (VUPEN) http://www.vupen.com/english/advisories/2011/0688 - (VUPEN) http://www.vupen.com/english/advisories/2011/0688 - Broken Link
References (SECUNIA) http://secunia.com/advisories/43856 - (SECUNIA) http://secunia.com/advisories/43856 - Broken Link
References (SECTRACK) http://www.securitytracker.com/id?1025238 - (SECTRACK) http://www.securitytracker.com/id?1025238 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb11-06.html - (CONFIRM) http://www.adobe.com/support/security/bulletins/apsb11-06.html - Not Applicable
References (SECTRACK) http://www.securitytracker.com/id?1025210 - (SECTRACK) http://www.securitytracker.com/id?1025210 - Broken Link, Third Party Advisory, VDB Entry
References (SREASON) http://securityreason.com/securityalert/8152 - (SREASON) http://securityreason.com/securityalert/8152 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2011/0732 - (VUPEN) http://www.vupen.com/english/advisories/2011/0732 - Broken Link
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html - Mailing List, Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2011/0656 - (VUPEN) http://www.vupen.com/english/advisories/2011/0656 - Broken Link
References (SECUNIA) http://secunia.com/advisories/43772 - (SECUNIA) http://secunia.com/advisories/43772 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2011/0655 - (VUPEN) http://www.vupen.com/english/advisories/2011/0655 - Broken Link
References (BID) http://www.securityfocus.com/bid/46860 - (BID) http://www.securityfocus.com/bid/46860 - Broken Link, Third Party Advisory, VDB Entry
References (CERT-VN) http://www.kb.cert.org/vuls/id/192052 - US Government Resource (CERT-VN) http://www.kb.cert.org/vuls/id/192052 - Third Party Advisory, US Government Resource
References (CONFIRM) http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html - (CONFIRM) http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14147 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14147 - Broken Link
References (SECUNIA) http://secunia.com/advisories/43751 - (SECUNIA) http://secunia.com/advisories/43751 - Broken Link
References (MISC) http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html - (MISC) http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html - Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id?1025211 - (SECTRACK) http://www.securitytracker.com/id?1025211 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/43757 - (SECUNIA) http://secunia.com/advisories/43757 - Broken Link

Information

Published : 2011-03-15 17:55

Updated : 2025-02-13 17:51


NVD link : CVE-2011-0609

Mitre link : CVE-2011-0609


JSON object : View

Products Affected

oracle

  • solaris

adobe

  • acrobat
  • acrobat_reader
  • flash_player
  • air

google

  • chrome_os
  • chrome
  • android

apple

  • mac_os_x
  • macos

linux

  • linux_kernel

opensuse

  • opensuse

suse

  • linux_enterprise

microsoft

  • windows