CVE-2014-0497

Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
References
Link Resource
http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html Release Notes
http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html Release Notes
http://helpx.adobe.com/security/products/flash-player/apsb14-04.html Broken Link Patch Vendor Advisory
http://helpx.adobe.com/security/products/flash-player/apsb14-04.html Broken Link Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html Mailing List
http://rhn.redhat.com/errata/RHSA-2014-0137.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0137.html Third Party Advisory
http://secunia.com/advisories/56437 Broken Link Third Party Advisory
http://secunia.com/advisories/56437 Broken Link Third Party Advisory
http://secunia.com/advisories/56737 Broken Link Third Party Advisory
http://secunia.com/advisories/56737 Broken Link Third Party Advisory
http://secunia.com/advisories/56780 Broken Link Third Party Advisory
http://secunia.com/advisories/56780 Broken Link Third Party Advisory
http://secunia.com/advisories/56799 Broken Link Third Party Advisory
http://secunia.com/advisories/56799 Broken Link Third Party Advisory
http://secunia.com/advisories/56839 Broken Link Third Party Advisory
http://secunia.com/advisories/56839 Broken Link Third Party Advisory
http://www.exploit-db.com/exploits/33212 Third Party Advisory VDB Entry
http://www.exploit-db.com/exploits/33212 Third Party Advisory VDB Entry
http://www.osvdb.org/102849 Broken Link
http://www.osvdb.org/102849 Broken Link
http://www.securityfocus.com/bid/65327 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/65327 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029715 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1029715 Broken Link Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90884 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/90884 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

History

20 Dec 2024, 14:20

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List
References (SECUNIA) http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory
References (SECTRACK) http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0137.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-0137.html - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory
References (OSVDB) http://www.osvdb.org/102849 - Broken Link () http://www.osvdb.org/102849 - Broken Link
References (SECUNIA) http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory
References (CONFIRM) http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List
References (BID) http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/90884 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/90884 - Third Party Advisory, VDB Entry
References (EXPLOIT-DB) http://www.exploit-db.com/exploits/33212 - Third Party Advisory, VDB Entry () http://www.exploit-db.com/exploits/33212 - Third Party Advisory, VDB Entry

19 Sep 2024, 19:56

Type Values Removed Values Added
CWE CWE-189 CWE-191
References (SECUNIA) http://secunia.com/advisories/56737 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Third Party Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes
References (SECUNIA) http://secunia.com/advisories/56839 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory
References (CONFIRM) http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Patch, Vendor Advisory (CONFIRM) http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory
References (SECTRACK) http://www.securitytracker.com/id/1029715 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/56799 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/56437 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/65327 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/56780 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory
First Time Google chrome
Redhat enterprise Linux Desktop
Opensuse opensuse
Apple macos
Suse linux Enterprise Desktop
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Workstation
Opensuse
Redhat enterprise Linux Eus
Google chrome Os
Redhat enterprise Linux Server
Google
Suse
Redhat
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 9.8
CPE cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*

Information

Published : 2014-02-05 05:15

Updated : 2024-12-20 14:20


NVD link : CVE-2014-0497

Mitre link : CVE-2014-0497


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_server_aus
  • enterprise_linux_workstation

google

  • chrome_os
  • chrome

apple

  • mac_os_x
  • macos

adobe

  • flash_player

opensuse

  • opensuse

linux

  • linux_kernel

suse

  • linux_enterprise_desktop

microsoft

  • windows
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)