CVE-2014-0502

Double free vulnerability in Adobe Flash Player before 11.7.700.269 and 11.8.x through 12.0.x before 12.0.0.70 on Windows and Mac OS X and before 11.2.202.341 on Linux, Adobe AIR before 4.0.0.1628 on Android, Adobe AIR SDK before 4.0.0.1628, and Adobe AIR SDK & Compiler before 4.0.0.1628 allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2014.
References
Link Resource
http://helpx.adobe.com/security/products/flash-player/apsb14-07.html Broken Link Patch Vendor Advisory
http://helpx.adobe.com/security/products/flash-player/apsb14-07.html Broken Link Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html Mailing List
http://rhn.redhat.com/errata/RHSA-2014-0196.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-0196.html Third Party Advisory
http://security.gentoo.org/glsa/glsa-201405-04.xml Third Party Advisory
http://security.gentoo.org/glsa/glsa-201405-04.xml Third Party Advisory
http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/ Exploit Third Party Advisory
http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/ Exploit Third Party Advisory
https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html Exploit Third Party Advisory
https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:adobe:adobe_air_sdk:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*

History

20 Dec 2024, 14:22

Type Values Removed Values Added
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html - Mailing List () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00015.html - Mailing List
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html - Mailing List () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00017.html - Mailing List
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0196.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-0196.html - Third Party Advisory
References (MISC) https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html - Exploit, Third Party Advisory () https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html - Exploit, Third Party Advisory
References (MISC) http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/ - Exploit, Third Party Advisory () http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/ - Exploit, Third Party Advisory
References (GENTOO) http://security.gentoo.org/glsa/glsa-201405-04.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-201405-04.xml - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html - Mailing List () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00014.html - Mailing List
References (CONFIRM) http://helpx.adobe.com/security/products/flash-player/apsb14-07.html - Broken Link, Patch, Vendor Advisory () http://helpx.adobe.com/security/products/flash-player/apsb14-07.html - Broken Link, Patch, Vendor Advisory

19 Sep 2024, 19:53

Type Values Removed Values Added
CWE CWE-399 CWE-415
CVSS v2 : 10.0
v3 : unknown
v2 : 10.0
v3 : 8.8
First Time Redhat enterprise Linux Desktop
Opensuse opensuse
Suse linux Enterprise Desktop
Redhat enterprise Linux Server Aus
Redhat enterprise Linux Workstation
Opensuse
Google android
Redhat enterprise Linux Eus
Redhat enterprise Linux Server
Google
Suse
Redhat
References (MISC) https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html - Third Party Advisory (MISC) https://volatility-labs.blogspot.com/2014/04/building-decoder-for-cve-2014-0502.html - Exploit, Third Party Advisory
References (MISC) http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/ - Third Party Advisory (MISC) http://www.alienvault.com/open-threat-exchange/blog/analysis-of-an-attack-exploiting-the-adobe-zero-day-cve-2014-0502/ - Exploit, Third Party Advisory
References (CONFIRM) http://helpx.adobe.com/security/products/flash-player/apsb14-07.html - Patch, Vendor Advisory (CONFIRM) http://helpx.adobe.com/security/products/flash-player/apsb14-07.html - Broken Link, Patch, Vendor Advisory
CPE cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

Information

Published : 2014-02-21 05:07

Updated : 2024-12-20 14:22


NVD link : CVE-2014-0502

Mitre link : CVE-2014-0502


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_eus
  • enterprise_linux_server_aus
  • enterprise_linux_workstation

adobe

  • adobe_air_sdk
  • adobe_air
  • flash_player

apple

  • mac_os_x

google

  • android

opensuse

  • opensuse

linux

  • linux_kernel

suse

  • linux_enterprise_desktop

microsoft

  • windows
CWE
CWE-415

Double Free