Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
20 Dec 2024, 14:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List | |
References | () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
References | () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2014-0137.html - Third Party Advisory | |
References | () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
References | () http://www.osvdb.org/102849 - Broken Link | |
References | () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
References | () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List | |
References | () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90884 - Third Party Advisory, VDB Entry | |
References | () http://www.exploit-db.com/exploits/33212 - Third Party Advisory, VDB Entry |
19 Sep 2024, 19:56
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-191 | |
References | (SECUNIA) http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
References | (CONFIRM) http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
References | (SECUNIA) http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
References | (CONFIRM) http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
First Time |
Google chrome
Redhat enterprise Linux Desktop Opensuse opensuse Apple macos Suse linux Enterprise Desktop Redhat enterprise Linux Server Aus Redhat enterprise Linux Workstation Opensuse Redhat enterprise Linux Eus Google chrome Os Redhat enterprise Linux Server Suse Redhat |
|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CPE | cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:* |
Information
Published : 2014-02-05 05:15
Updated : 2024-12-20 14:20
NVD link : CVE-2014-0497
Mitre link : CVE-2014-0497
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux_server_aus
- enterprise_linux_workstation
- chrome_os
- chrome
apple
- mac_os_x
- macos
adobe
- flash_player
opensuse
- opensuse
linux
- linux_kernel
suse
- linux_enterprise_desktop
microsoft
- windows
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)