Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-6927 (GCVE-0-2016-6927)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:43:38.492Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201610-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201610-10" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "RHSA-2016:1865", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "name": "92927", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92927" }, { "name": "1036791", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036791" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-09-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "GLSA-201610-10", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201610-10" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "RHSA-2016:1865", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "name": "92927", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92927" }, { "name": "1036791", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036791" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2016-6927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201610-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-10" }, { "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "RHSA-2016:1865", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "name": "92927", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92927" }, { "name": "1036791", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036791" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2016-6927", "datePublished": "2016-09-14T18:00:00", "dateReserved": "2016-08-23T00:00:00", "dateUpdated": "2024-08-06T01:43:38.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-6927\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2016-09-14T18:59:24.110\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n de memoria en Adobe Flash Player en versiones anteriores a 18.0.0.375 y 19.x hasta la versi\u00f3n 23.x en versiones anteriores a 23.0.0.162 en Windows y OS X y en versiones anteriores a 11.2.202.635 en Linux permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931 y CVE-2016-6932.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"11.2.202.632\",\"matchCriteriaId\":\"E7CA6039-558F-4C74-95A6-5C651DD6884D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21540673-614A-4D40-8BD7-3F07723803B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93068DB-549B-45AB-8E5C-00EB5D8B5CF8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*\",\"versionEndIncluding\":\"22.0.0.211\",\"matchCriteriaId\":\"15F5093D-7418-4D20-BFBA-081D69D7AE7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*\",\"versionEndIncluding\":\"22.0.0.211\",\"matchCriteriaId\":\"CE5BB30B-7DE2-469E-AF95-D552C2BF15F8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"22.0.0.211\",\"matchCriteriaId\":\"186A94B2-FFE5-48FF-BADA-0A8083C6CD3D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*\",\"versionEndIncluding\":\"18.0.0.366\",\"matchCriteriaId\":\"7DB6BA20-BD01-4169-AFE3-07DEB17381C9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*\",\"versionEndIncluding\":\"22.0.0.211\",\"matchCriteriaId\":\"156F0DBE-F62C-4596-BF96-9E1224B74494\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1865.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92927\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036791\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb16-29.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201610-10\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1865.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92927\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb16-29.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201610-10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
RHSA-2016:1865
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 11.2.202.635.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1865", "url": "https://access.redhat.com/errata/RHSA-2016:1865" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "category": "external", "summary": "1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1865.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2025-09-26T03:48:23+00:00", "generator": { "date": "2025-09-26T03:48:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2016:1865", "initial_release_date": "2016-09-14T07:14:02+00:00", "revision_history": [ { "date": "2016-09-14T07:14:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-14T07:14:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:48:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product_id": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.635-1.el6_8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product_id": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.635-1.el5_11?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "relates_to_product_reference": "5Client-Supplementary-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "relates_to_product_reference": "5Server-Supplementary-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Client-Supplementary-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Server-Supplementary-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.8.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4271", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4277 and CVE-2016-4278, aka a \"local-with-filesystem Flash sandbox bypass\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4271" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4271", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4271" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4272", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4272" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4272", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4272" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4274", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4274" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4274", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4274" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4275", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4275" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4275", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4275" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4276", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4276" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4276", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4276" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4276", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4276" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4277", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4278.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4277" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4277", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4277" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4277", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4277" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4278", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4277.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4278" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4278", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4278" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4278", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4278" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4279", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4279" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4279", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4279" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4279", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4279" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4280", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4280" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4280", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4280" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4281", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4281" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4281", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4281" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4282", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4282" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4282", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4282" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4282", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4282" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4283", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4283" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4283", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4283" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4284", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4284" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4284", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4284" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4285", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4285" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4285", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4285" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4287", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4287" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4287", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4287" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6921", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6921" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6921", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6921" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6922", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6922" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6922", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6922" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6922", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6922" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6923", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6923" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6923", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6923" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6924", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6922.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6924" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6924", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6924" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6924", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6924" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6925", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6925" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6925", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6925" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6926", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6926" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6926", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6926" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6926", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6926" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6927", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6927" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6927", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6927" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6927", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6927" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6929", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6929" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6929", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6929" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6930", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6930" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6930", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6930" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6931", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6931" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6931", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6931" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6932", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6931.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6932" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6932", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6932" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" } ] }
rhsa-2016_1865
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 11.2.202.635.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1865", "url": "https://access.redhat.com/errata/RHSA-2016:1865" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "category": "external", "summary": "1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1865.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2024-11-14T20:48:55+00:00", "generator": { "date": "2024-11-14T20:48:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:1865", "initial_release_date": "2016-09-14T07:14:02+00:00", "revision_history": [ { "date": "2016-09-14T07:14:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-14T07:14:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T20:48:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product_id": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.635-1.el6_8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product_id": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.635-1.el5_11?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "relates_to_product_reference": "5Client-Supplementary-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "relates_to_product_reference": "5Server-Supplementary-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Client-Supplementary-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Server-Supplementary-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.8.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4271", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4277 and CVE-2016-4278, aka a \"local-with-filesystem Flash sandbox bypass\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4271" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4271", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4271" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4272", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4272" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4272", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4272" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4274", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4274" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4274", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4274" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4275", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4275" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4275", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4275" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4276", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4276" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4276", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4276" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4276", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4276" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4277", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4278.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4277" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4277", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4277" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4277", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4277" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4278", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4277.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4278" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4278", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4278" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4278", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4278" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4279", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4279" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4279", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4279" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4279", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4279" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4280", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4280" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4280", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4280" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4281", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4281" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4281", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4281" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4282", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4282" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4282", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4282" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4282", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4282" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4283", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4283" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4283", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4283" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4284", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4284" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4284", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4284" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4285", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4285" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4285", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4285" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4287", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4287" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4287", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4287" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6921", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6921" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6921", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6921" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6922", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6922" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6922", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6922" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6922", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6922" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6923", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6923" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6923", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6923" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6924", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6922.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6924" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6924", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6924" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6924", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6924" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6925", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6925" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6925", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6925" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6926", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6926" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6926", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6926" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6926", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6926" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6927", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6927" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6927", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6927" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6927", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6927" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6929", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6929" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6929", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6929" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6930", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6930" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6930", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6930" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6931", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6931" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6931", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6931" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6932", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6931.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6932" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6932", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6932" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" } ] }
rhsa-2016:1865
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 11.2.202.635.\n\nSecurity Fix(es):\n\n* This update fixes multiple vulnerabilities in Adobe Flash Player. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1865", "url": "https://access.redhat.com/errata/RHSA-2016:1865" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "category": "external", "summary": "1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1865.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2025-09-26T03:48:23+00:00", "generator": { "date": "2025-09-26T03:48:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2016:1865", "initial_release_date": "2016-09-14T07:14:02+00:00", "revision_history": [ { "date": "2016-09-14T07:14:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-14T07:14:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:48:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.8.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.11.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product_id": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.635-1.el6_8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product_id": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.635-1.el5_11?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "relates_to_product_reference": "5Client-Supplementary-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el5_11.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el5_11.i386", "relates_to_product_reference": "5Server-Supplementary-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Client-Supplementary-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Server-Supplementary-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:11.2.202.635-1.el6_8.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" }, "product_reference": "flash-plugin-0:11.2.202.635-1.el6_8.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.8.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4271", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4277 and CVE-2016-4278, aka a \"local-with-filesystem Flash sandbox bypass\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4271" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4271", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4271" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4272", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4272" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4272", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4272" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4272", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4272" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4274", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4274" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4274", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4274" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4275", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4275" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4275", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4275" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4276", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4276" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4276", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4276" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4276", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4276" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4277", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4278.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4277" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4277", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4277" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4277", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4277" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4278", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4277.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4278" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4278", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4278" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4278", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4278" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4279", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4279" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4279", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4279" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4279", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4279" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4280", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4280" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4280", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4280" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4281", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4281" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4281", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4281" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4281", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4281" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4282", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4282" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4282", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4282" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4282", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4282" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4283", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4283" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4283", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4283" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4283", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4283" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4284", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4284" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4284", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4284" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4285", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-6922, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4285" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4285", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4285" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4285", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4285" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-4287", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4287" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4287", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4287" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4287", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4287" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6921", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6921" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6921", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6921" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6921", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6921" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6922", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6924.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6922" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6922", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6922" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6922", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6922" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6923", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6923" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6923", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6923" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6924", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6922.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6924" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6924", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6924" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6924", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6924" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6925", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6925" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6925", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6925" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6926", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6926" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6926", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6926" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6926", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6926" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6927", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6927" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6927", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6927" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6927", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6927" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6929", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6929" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6929", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6929" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6929", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6929" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6930", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6931, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6930" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6930", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6930" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6930", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6930" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6931", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6932.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6931" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6931", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6931" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6931", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6931" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" }, { "cve": "CVE-2016-6932", "discovery_date": "2016-09-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375725" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6931.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: multiple code execution issues fixed in APSB16-29", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6932" }, { "category": "external", "summary": "RHBZ#1375725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6932", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6932" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" } ], "release_date": "2016-09-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T07:14:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1865" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "5Server-Supplementary-5.11.Z:flash-plugin-0:11.2.202.635-1.el5_11.i386", "6Client-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Server-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686", "6Workstation-Supplementary-6.8.z:flash-plugin-0:11.2.202.635-1.el6_8.i686" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "flash-plugin: multiple code execution issues fixed in APSB16-29" } ] }
var-201609-0575
Vulnerability from variot
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932. This vulnerability CVE-2016-4272 , CVE-2016-4279 , CVE-2016-6921 , CVE-2016-6923 , CVE-2016-6925 , CVE-2016-6926 , CVE-2016-6929 , CVE-2016-6930 , CVE-2016-6931 ,and CVE-2016-6932 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use After Free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. The product enables viewing of applications, content and video across screens and browsers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Critical: flash-plugin security update Advisory ID: RHSA-2016:1865-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1865.html Issue date: 2016-09-14 CVE Names: CVE-2016-4271 CVE-2016-4272 CVE-2016-4274 CVE-2016-4275 CVE-2016-4276 CVE-2016-4277 CVE-2016-4278 CVE-2016-4279 CVE-2016-4280 CVE-2016-4281 CVE-2016-4282 CVE-2016-4283 CVE-2016-4284 CVE-2016-4285 CVE-2016-4287 CVE-2016-6921 CVE-2016-6922 CVE-2016-6923 CVE-2016-6924 CVE-2016-6925 CVE-2016-6926 CVE-2016-6927 CVE-2016-6929 CVE-2016-6930 CVE-2016-6931 CVE-2016-6932 =====================================================================
- Summary:
An update for flash-plugin is now available for Red Hat Enterprise Linux 5 Supplementary and Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64 Red Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64
- Description:
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update upgrades Flash Player to version 11.2.202.635. These vulnerabilities, detailed in the Adobe Security Bulletin listed in the References section, could allow an attacker to create a specially crafted SWF file that would cause flash-plugin to crash, execute arbitrary code, or disclose sensitive information when the victim loaded a page containing the malicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932)
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1375725 - flash-plugin: multiple code execution issues fixed in APSB16-29
- Package List:
Red Hat Enterprise Linux Desktop Supplementary (v. 5):
i386: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
x86_64: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
Red Hat Enterprise Linux Server Supplementary (v. 5):
i386: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
x86_64: flash-plugin-11.2.202.635-1.el5_11.i386.rpm
Red Hat Enterprise Linux Desktop Supplementary (v. 6):
i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
Red Hat Enterprise Linux Server Supplementary (v. 6):
i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
Red Hat Enterprise Linux Workstation Supplementary (v. 6):
i386: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
x86_64: flash-plugin-11.2.202.635-1.el6_8.i686.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2016-4271 https://access.redhat.com/security/cve/CVE-2016-4272 https://access.redhat.com/security/cve/CVE-2016-4274 https://access.redhat.com/security/cve/CVE-2016-4275 https://access.redhat.com/security/cve/CVE-2016-4276 https://access.redhat.com/security/cve/CVE-2016-4277 https://access.redhat.com/security/cve/CVE-2016-4278 https://access.redhat.com/security/cve/CVE-2016-4279 https://access.redhat.com/security/cve/CVE-2016-4280 https://access.redhat.com/security/cve/CVE-2016-4281 https://access.redhat.com/security/cve/CVE-2016-4282 https://access.redhat.com/security/cve/CVE-2016-4283 https://access.redhat.com/security/cve/CVE-2016-4284 https://access.redhat.com/security/cve/CVE-2016-4285 https://access.redhat.com/security/cve/CVE-2016-4287 https://access.redhat.com/security/cve/CVE-2016-6921 https://access.redhat.com/security/cve/CVE-2016-6922 https://access.redhat.com/security/cve/CVE-2016-6923 https://access.redhat.com/security/cve/CVE-2016-6924 https://access.redhat.com/security/cve/CVE-2016-6925 https://access.redhat.com/security/cve/CVE-2016-6926 https://access.redhat.com/security/cve/CVE-2016-6927 https://access.redhat.com/security/cve/CVE-2016-6929 https://access.redhat.com/security/cve/CVE-2016-6930 https://access.redhat.com/security/cve/CVE-2016-6931 https://access.redhat.com/security/cve/CVE-2016-6932 https://access.redhat.com/security/updates/classification/#critical https://helpx.adobe.com/security/products/flash-player/apsb16-29.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFX2Pp+XlSAg2UNWIIRAp1iAKCmfmh77bYTg10K3b0b6aJuxtLEgACfZlyh ynwsnFlRoTlOLVQLiobHvps= =1fXO -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce .
Background
The Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions.
Workaround
There is no known workaround at this time.
Resolution
All Adobe Flash Player 23.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-23.0.0.205"
All Adobe Flash Player 11.x users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-11.2.202.635"
References
[ 1 ] CVE-2016-4182 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182 [ 2 ] CVE-2016-4271 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271 [ 3 ] CVE-2016-4272 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272 [ 4 ] CVE-2016-4273 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273 [ 5 ] CVE-2016-4274 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274 [ 6 ] CVE-2016-4275 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275 [ 7 ] CVE-2016-4276 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276 [ 8 ] CVE-2016-4277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277 [ 9 ] CVE-2016-4278 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278 [ 10 ] CVE-2016-4279 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279 [ 11 ] CVE-2016-4280 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280 [ 12 ] CVE-2016-4281 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281 [ 13 ] CVE-2016-4282 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282 [ 14 ] CVE-2016-4283 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283 [ 15 ] CVE-2016-4284 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284 [ 16 ] CVE-2016-4285 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285 [ 17 ] CVE-2016-4286 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286 [ 18 ] CVE-2016-4287 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287 [ 19 ] CVE-2016-6921 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921 [ 20 ] CVE-2016-6922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922 [ 21 ] CVE-2016-6923 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923 [ 22 ] CVE-2016-6924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924 [ 23 ] CVE-2016-6925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925 [ 24 ] CVE-2016-6926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926 [ 25 ] CVE-2016-6927 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927 [ 26 ] CVE-2016-6929 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929 [ 27 ] CVE-2016-6930 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930 [ 28 ] CVE-2016-6931 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931 [ 29 ] CVE-2016-6932 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932 [ 30 ] CVE-2016-6981 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981 [ 31 ] CVE-2016-6982 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982 [ 32 ] CVE-2016-6983 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983 [ 33 ] CVE-2016-6984 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984 [ 34 ] CVE-2016-6985 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985 [ 35 ] CVE-2016-6986 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986 [ 36 ] CVE-2016-6987 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987 [ 37 ] CVE-2016-6989 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989 [ 38 ] CVE-2016-6990 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990 [ 39 ] CVE-2016-6992 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992 [ 40 ] CVE-2016-7855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201610-10
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2016 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201609-0575", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "18.0.0.366" }, { "model": "flash player desktop runtime", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "22.0.0.211" }, { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "22.0.0.211" }, { "model": "flash player", "scope": "lte", "trust": 1.0, "vendor": "adobe", "version": "11.2.202.632" }, { "model": "flash player", "scope": "eq", "trust": 0.9, "vendor": "adobe", "version": "11.2.202.632" }, { "model": "chrome", "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "11.2.202.635 (linux)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "23.0.0.162 (windows 10/8.1 edition microsoft edge/internet explorer 11)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "23.0.0.162 (windows/macintosh/linux/chromeos edition chrome)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "desktop runtime 23.0.0.162 (windows/macintosh)" }, { "model": "flash player", "scope": "lt", "trust": 0.8, "vendor": "adobe", "version": "continuous support release 18.0.0.375 (windows/macintosh)" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for 32-bit systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for x64-based systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1511 for 32-bit systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1511 for x64-based systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1607 for 32-bit systems" }, { "model": "windows 10", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "version 1607 for x64-based systems" }, { "model": "windows 8.1", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for 32-bit systems" }, { "model": "windows 8.1", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "for x64-based systems" }, { "model": "windows rt 8.1", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "windows server 2012", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "none" }, { "model": "windows server 2012", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "r2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.246.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.50080" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.25" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.60.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202346" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.95.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.31.230" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0235" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.155.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.209" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0214" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.635" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.153.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.197" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.268" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.2460" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.285" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.360" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.9.900.170" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11150" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.26" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.260" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.48" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.402.265" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202341" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.228" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.97" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.548" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300271" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.161" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.63" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.257" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.28.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300270" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.260.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.23" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.41" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.277.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.168" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300214" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.429" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.283.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.21" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.44" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.226" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.50" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.442" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.279" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.124.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.23" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202238" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.85.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.438" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.61" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.180" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.1.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.213" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.185" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.460" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.31.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.252" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.296" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.9.900.117" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.267" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.203" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.48.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.281" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.241" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.24" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.59" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.508" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.73" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.70.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.106.16" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.239" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.366" }, { "model": "edge", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.18" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.242" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.554" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.48" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.21" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.280" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202359" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202425" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602105" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.291" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.270" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.95.2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.33" }, { "model": "internet explorer", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300231" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.22" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.51.66" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.302" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.324" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.9.900.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.43" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.242" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.54" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.27" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0252" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.262.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.238" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.19" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.9" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.20295" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.375" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700232" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.20" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "4" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.468" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.92.8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.616" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.75" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.24" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202160" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.189" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.66.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502118" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0182" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.198" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202400" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.336" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.356" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.233" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11569" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.3218" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.63" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.260" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.228" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.310" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.149" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.277" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.352" }, { "model": "flash player", "scope": "ne", "trust": 0.3, "vendor": "adobe", "version": "23.0.0.162" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.206" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.61.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.168" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.272" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.22.87" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.203" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.309" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0259" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.73.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.569" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.67" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.69.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.151.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.243" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502124" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.291" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.202" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.29" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.159.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.343" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.521" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700169" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.42.34" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.81" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.626" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.94" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.26" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.4" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.28" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.67.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.43" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.335" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.102.65" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0.35.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.115.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.231" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300250" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.621" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.55" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.14.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.110" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.156.12" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.1129" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.13" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.286" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.53.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202221" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "22.0.0.192" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0179" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.22" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6.0.79" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.14" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.223" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.305" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300.273" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.559" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.8.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.264" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.2.54" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.451" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.68.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.457" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.16" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.261" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202236" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.204" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.245" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.252" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.242" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.5" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.154.18" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.194" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.32.18" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.12.36" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.289" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202297" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.289.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202280" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.251" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.185.25" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202418" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300268" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.61" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.152.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700275" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "22.0.0.209" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.275" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.402.287" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.52.14" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.269" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.171" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.23" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.82.76" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "17.0.0.188" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.160" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.255" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.535" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0.1.153" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.86" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.8.800.170" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.241" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.6.602.167" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202197" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.394" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11554" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.105.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.47.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.45.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.540" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.402.278" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.244" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0176" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300257" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.58" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.92.10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "17.0.0.169" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.241" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.6" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.102.64" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.12.35" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.186.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.135" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.4.400231" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.287" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.34" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.261" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.070" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.44" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.235" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.250" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "16.0.0.234" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.224" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0177" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.269" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "17.0.0.134" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.11" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.378" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.111.10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.272" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.77" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.296" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.232" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.63" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.157.51" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.273" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.333" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.228" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.106.17" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.226" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.52.15" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.327" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.112.61" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.2.152.32" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.25" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.261" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.406" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.52.14.1" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "2" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.491" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.7" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.182" }, { "model": "flash player r67", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.102.62" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.9.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502131" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.332" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.235" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0.0.125" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.1.53.64" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.136" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "6.0.21.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.160" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.233" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.181.34" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "20.0.0.306" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "22.0.0.211" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.51" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.59" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.292" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.466" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.258" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.225" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.258" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.229" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.452" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.115.8" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "9.0.159.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.223" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.10" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "15.0.0.246" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.0.15.3" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.411" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.16" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.440" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.5.502.146" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "13.0.0.201" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "21.0.0.216" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.481" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.15" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.68" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.378.5" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.7.700.257" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202350" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.24.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "7.0.19.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "8.0.34.0" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.3.300265" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.143" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.326" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.577" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.223" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "14.0.0.145" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.1.11164" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "10.3.183.5" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "12.0.0.38" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "18.0.0.329" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.262" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "19.0.0.207" }, { "model": "flash player", "scope": "eq", "trust": 0.3, "vendor": "adobe", "version": "11.2.202.424" } ], "sources": [ { "db": "BID", "id": "92927" }, { "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "db": "CNNVD", "id": "CNNVD-201609-307" }, { "db": "NVD", "id": "CVE-2016-6927" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:google:chrome", "vulnerable": true }, { "cpe22Uri": "cpe:/a:adobe:flash_player", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_10", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_8.1", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_rt_8.1", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_server_2012", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004753" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Nicolas Joly of Microsoft Vulnerability Research,Mumei working with Trend Micro\u0027s Zero Day Initiative,Yuki Chen of Qihoo 360 Vulcan Team,JieZeng of Tencent Zhanlu Lab working with the Chromium Vulnerability Rewards Program", "sources": [ { "db": "BID", "id": "92927" } ], "trust": 0.3 }, "cve": "CVE-2016-6927", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2016-6927", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2016-6927", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-95747", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2016-6927", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2016-6927", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-6927", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-6927", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201609-307", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-95747", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2016-6927", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-95747" }, { "db": "VULMON", "id": "CVE-2016-6927" }, { "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "db": "CNNVD", "id": "CNNVD-201609-307" }, { "db": "NVD", "id": "CVE-2016-6927" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932. This vulnerability CVE-2016-4272 , CVE-2016-4279 , CVE-2016-6921 , CVE-2016-6923 , CVE-2016-6925 , CVE-2016-6926 , CVE-2016-6929 , CVE-2016-6930 , CVE-2016-6931 ,and CVE-2016-6932 Is a different vulnerability. Supplementary information : CWE Vulnerability type by CWE-416: Use After Free ( Use of freed memory ) Has been identified. http://cwe.mitre.org/data/definitions/416.htmlAn attacker could execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions. The product enables viewing of applications, content and video across screens and browsers. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Critical: flash-plugin security update\nAdvisory ID: RHSA-2016:1865-01\nProduct: Red Hat Enterprise Linux Supplementary\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2016-1865.html\nIssue date: 2016-09-14\nCVE Names: CVE-2016-4271 CVE-2016-4272 CVE-2016-4274 \n CVE-2016-4275 CVE-2016-4276 CVE-2016-4277 \n CVE-2016-4278 CVE-2016-4279 CVE-2016-4280 \n CVE-2016-4281 CVE-2016-4282 CVE-2016-4283 \n CVE-2016-4284 CVE-2016-4285 CVE-2016-4287 \n CVE-2016-6921 CVE-2016-6922 CVE-2016-6923 \n CVE-2016-6924 CVE-2016-6925 CVE-2016-6926 \n CVE-2016-6927 CVE-2016-6929 CVE-2016-6930 \n CVE-2016-6931 CVE-2016-6932 \n=====================================================================\n\n1. Summary:\n\nAn update for flash-plugin is now available for Red Hat Enterprise Linux 5\nSupplementary and Red Hat Enterprise Linux 6 Supplementary. \n\nRed Hat Product Security has rated this update as having a security impact\nof Critical. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 5) - i386, x86_64\nRed Hat Enterprise Linux Desktop Supplementary (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Server Supplementary (v. 5) - i386, x86_64\nRed Hat Enterprise Linux Server Supplementary (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Supplementary (v. 6) - i386, x86_64\n\n3. Description:\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in. \n\nThis update upgrades Flash Player to version 11.2.202.635. These\nvulnerabilities, detailed in the Adobe Security Bulletin listed in the\nReferences section, could allow an attacker to create a specially crafted\nSWF file that would cause flash-plugin to crash, execute arbitrary code, or\ndisclose sensitive information when the victim loaded a page containing the\nmalicious SWF content. (CVE-2016-4271, CVE-2016-4272, CVE-2016-4274,\nCVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279,\nCVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284,\nCVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923,\nCVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929,\nCVE-2016-6930, CVE-2016-6931, CVE-2016-6932)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1375725 - flash-plugin: multiple code execution issues fixed in APSB16-29\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 5):\n\ni386:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nRed Hat Enterprise Linux Server Supplementary (v. 5):\n\ni386:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el5_11.i386.rpm\n\nRed Hat Enterprise Linux Desktop Supplementary (v. 6):\n\ni386:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nRed Hat Enterprise Linux Server Supplementary (v. 6):\n\ni386:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nRed Hat Enterprise Linux Workstation Supplementary (v. 6):\n\ni386:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nx86_64:\nflash-plugin-11.2.202.635-1.el6_8.i686.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-4271\nhttps://access.redhat.com/security/cve/CVE-2016-4272\nhttps://access.redhat.com/security/cve/CVE-2016-4274\nhttps://access.redhat.com/security/cve/CVE-2016-4275\nhttps://access.redhat.com/security/cve/CVE-2016-4276\nhttps://access.redhat.com/security/cve/CVE-2016-4277\nhttps://access.redhat.com/security/cve/CVE-2016-4278\nhttps://access.redhat.com/security/cve/CVE-2016-4279\nhttps://access.redhat.com/security/cve/CVE-2016-4280\nhttps://access.redhat.com/security/cve/CVE-2016-4281\nhttps://access.redhat.com/security/cve/CVE-2016-4282\nhttps://access.redhat.com/security/cve/CVE-2016-4283\nhttps://access.redhat.com/security/cve/CVE-2016-4284\nhttps://access.redhat.com/security/cve/CVE-2016-4285\nhttps://access.redhat.com/security/cve/CVE-2016-4287\nhttps://access.redhat.com/security/cve/CVE-2016-6921\nhttps://access.redhat.com/security/cve/CVE-2016-6922\nhttps://access.redhat.com/security/cve/CVE-2016-6923\nhttps://access.redhat.com/security/cve/CVE-2016-6924\nhttps://access.redhat.com/security/cve/CVE-2016-6925\nhttps://access.redhat.com/security/cve/CVE-2016-6926\nhttps://access.redhat.com/security/cve/CVE-2016-6927\nhttps://access.redhat.com/security/cve/CVE-2016-6929\nhttps://access.redhat.com/security/cve/CVE-2016-6930\nhttps://access.redhat.com/security/cve/CVE-2016-6931\nhttps://access.redhat.com/security/cve/CVE-2016-6932\nhttps://access.redhat.com/security/updates/classification/#critical\nhttps://helpx.adobe.com/security/products/flash-player/apsb16-29.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2016 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFX2Pp+XlSAg2UNWIIRAp1iAKCmfmh77bYTg10K3b0b6aJuxtLEgACfZlyh\nynwsnFlRoTlOLVQLiobHvps=\n=1fXO\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. \n\nBackground\n==========\n\nThe Adobe Flash Player is a renderer for the SWF file format, which is\ncommonly used to provide interactive websites. \nPlease review the CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker could possibly execute arbitrary code with the\nprivileges of the process, cause a Denial of Service condition, obtain\nsensitive information, or bypass security restrictions. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Adobe Flash Player 23.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=www-plugins/adobe-flash-23.0.0.205\"\n\nAll Adobe Flash Player 11.x users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=www-plugins/adobe-flash-11.2.202.635\"\n\nReferences\n==========\n\n[ 1 ] CVE-2016-4182\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4182\n[ 2 ] CVE-2016-4271\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4271\n[ 3 ] CVE-2016-4272\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4272\n[ 4 ] CVE-2016-4273\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4273\n[ 5 ] CVE-2016-4274\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4274\n[ 6 ] CVE-2016-4275\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4275\n[ 7 ] CVE-2016-4276\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4276\n[ 8 ] CVE-2016-4277\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4277\n[ 9 ] CVE-2016-4278\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4278\n[ 10 ] CVE-2016-4279\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4279\n[ 11 ] CVE-2016-4280\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4280\n[ 12 ] CVE-2016-4281\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4281\n[ 13 ] CVE-2016-4282\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4282\n[ 14 ] CVE-2016-4283\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4283\n[ 15 ] CVE-2016-4284\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4284\n[ 16 ] CVE-2016-4285\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4285\n[ 17 ] CVE-2016-4286\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4286\n[ 18 ] CVE-2016-4287\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4287\n[ 19 ] CVE-2016-6921\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6921\n[ 20 ] CVE-2016-6922\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6922\n[ 21 ] CVE-2016-6923\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6923\n[ 22 ] CVE-2016-6924\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6924\n[ 23 ] CVE-2016-6925\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6925\n[ 24 ] CVE-2016-6926\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6926\n[ 25 ] CVE-2016-6927\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6927\n[ 26 ] CVE-2016-6929\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6929\n[ 27 ] CVE-2016-6930\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6930\n[ 28 ] CVE-2016-6931\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6931\n[ 29 ] CVE-2016-6932\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6932\n[ 30 ] CVE-2016-6981\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6981\n[ 31 ] CVE-2016-6982\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6982\n[ 32 ] CVE-2016-6983\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6983\n[ 33 ] CVE-2016-6984\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6984\n[ 34 ] CVE-2016-6985\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6985\n[ 35 ] CVE-2016-6986\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6986\n[ 36 ] CVE-2016-6987\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6987\n[ 37 ] CVE-2016-6989\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6989\n[ 38 ] CVE-2016-6990\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6990\n[ 39 ] CVE-2016-6992\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6992\n[ 40 ] CVE-2016-7855\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7855\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201610-10\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2016 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2016-6927" }, { "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "db": "BID", "id": "92927" }, { "db": "VULHUB", "id": "VHN-95747" }, { "db": "VULMON", "id": "CVE-2016-6927" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-6927", "trust": 3.1 }, { "db": "BID", "id": "92927", "trust": 2.1 }, { "db": "SECTRACK", "id": "1036791", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2016-004753", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201609-307", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-515", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-95747", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2016-6927", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "138714", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "139424", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95747" }, { "db": "VULMON", "id": "CVE-2016-6927" }, { "db": "BID", "id": "92927" }, { "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" }, { "db": "CNNVD", "id": "CNNVD-201609-307" }, { "db": "NVD", "id": "CVE-2016-6927" } ] }, "id": "VAR-201609-0575", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-95747" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:42:35.285000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APSB16-29", "trust": 0.8, "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "title": "APSB16-29", "trust": 0.8, "url": "https://helpx.adobe.com/jp/security/products/flash-player/apsb16-29.html" }, { "title": "Google Chrome", "trust": 0.8, "url": "https://www.google.com/intl/ja/chrome/browser/features.html" }, { "title": "Chrome Releases", "trust": 0.8, "url": "http://googlechromereleases.blogspot.jp/" }, { "title": "Google Chrome \u3092\u66f4\u65b0\u3059\u308b", "trust": 0.8, "url": "https://support.google.com/chrome/answer/95414?hl=ja" }, { "title": "MS16-117", "trust": 0.8, "url": "https://technet.microsoft.com/en-us/library/security/ms16-117.aspx" }, { "title": "MS16-117", "trust": 0.8, "url": "https://technet.microsoft.com/ja-jp/library/security/MS16-117.aspx" }, { "title": "\u30a2\u30c9\u30d3 \u30b7\u30b9\u30c6\u30e0\u30ba\u793e Adobe Flash Player \u306e\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u304a\u77e5\u3089\u305b", "trust": 0.8, "url": "http://www.fmworld.net/biz/common/adobe/20160915f.html" }, { "title": "Adobe Flash Player Remediation measures for reusing vulnerabilities after release", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=64092" }, { "title": "Red Hat: CVE-2016-6927", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2016-6927" }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2016-6923 " }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2016-6927 " }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2016-6931 " }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2016-6925 " }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2016-6926 " }, { "title": "", "trust": 0.1, "url": "https://github.com/Live-Hack-CVE/CVE-2016-4272 " }, { "title": "CVE-Study", "trust": 0.1, "url": "https://github.com/thdusdl1219/CVE-Study " }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/adobe-releases-updates-that-resolve-35-security-vulnerabilities/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2016-6927" }, { "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "db": "CNNVD", "id": "CNNVD-201609-307" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-95747" }, { "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "db": "NVD", "id": "CVE-2016-6927" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/92927" }, { "trust": 1.9, "url": "https://security.gentoo.org/glsa/201610-10" }, { "trust": 1.9, "url": "http://rhn.redhat.com/errata/rhsa-2016-1865.html" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1036791" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6927" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20160914-adobeflashplayer.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2016/at160034.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6927" }, { "trust": 0.3, "url": "https://www.adobe.com/software/flash/about/" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-16-515/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-6927" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4278" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4287" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4271" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4280" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4281" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4277" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4285" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6926" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6921" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6927" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4276" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6930" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6923" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6929" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4282" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4283" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6922" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6924" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6931" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4274" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4279" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4284" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6925" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4272" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4275" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=48877" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4284" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6924" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4278" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4279" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4271" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4272" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4275" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6931" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4277" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4276" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6922" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6932" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4287" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6932" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4283" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4281" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6921" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6925" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6930" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4280" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4274" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6926" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6923" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4285" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-6929" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-4282" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4279" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4284" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4182" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6921" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4282" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4276" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6987" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6931" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6985" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6930" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6925" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6989" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4286" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6984" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4281" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6923" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6992" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7855" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6986" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4275" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6982" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6981" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4274" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6924" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4278" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6932" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6990" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4271" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6926" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4280" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4283" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6983" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4285" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4273" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4273" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4287" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4182" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6929" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6922" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-6927" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4272" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-4277" } ], "sources": [ { "db": "VULHUB", "id": "VHN-95747" }, { "db": "VULMON", "id": "CVE-2016-6927" }, { "db": "BID", "id": "92927" }, { "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" }, { "db": "CNNVD", "id": "CNNVD-201609-307" }, { "db": "NVD", "id": "CVE-2016-6927" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-95747" }, { "db": "VULMON", "id": "CVE-2016-6927" }, { "db": "BID", "id": "92927" }, { "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "db": "PACKETSTORM", "id": "138714" }, { "db": "PACKETSTORM", "id": "139424" }, { "db": "CNNVD", "id": "CNNVD-201609-307" }, { "db": "NVD", "id": "CVE-2016-6927" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-09-14T00:00:00", "db": "VULHUB", "id": "VHN-95747" }, { "date": "2016-09-14T00:00:00", "db": "VULMON", "id": "CVE-2016-6927" }, { "date": "2016-09-13T00:00:00", "db": "BID", "id": "92927" }, { "date": "2016-09-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "date": "2016-09-14T16:51:57", "db": "PACKETSTORM", "id": "138714" }, { "date": "2016-10-30T22:14:44", "db": "PACKETSTORM", "id": "139424" }, { "date": "2016-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-307" }, { "date": "2016-09-14T18:59:24.110000", "db": "NVD", "id": "CVE-2016-6927" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-19T00:00:00", "db": "VULHUB", "id": "VHN-95747" }, { "date": "2023-01-19T00:00:00", "db": "VULMON", "id": "CVE-2016-6927" }, { "date": "2016-09-13T00:00:00", "db": "BID", "id": "92927" }, { "date": "2016-09-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-004753" }, { "date": "2023-01-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201609-307" }, { "date": "2024-11-21T02:57:07.210000", "db": "NVD", "id": "CVE-2016-6927" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "139424" }, { "db": "CNNVD", "id": "CNNVD-201609-307" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Adobe Flash Player Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-004753" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201609-307" } ], "trust": 0.6 } }
ghsa-993m-7mxh-9wwg
Vulnerability from github
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
{ "affected": [], "aliases": [ "CVE-2016-6927" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-09-14T18:59:00Z", "severity": "CRITICAL" }, "details": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "id": "GHSA-993m-7mxh-9wwg", "modified": "2022-05-14T03:55:56Z", "published": "2022-05-14T03:55:56Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6927" }, { "type": "WEB", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201610-10" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/92927" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036791" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
suse-su-2016:2312-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for flash-player", "title": "Title of the patch" }, { "category": "description", "text": "This update for flash-player fixes the following security issues (APSB16-29, boo#998589):\n\n- integer overflow vulnerability that could lead to code execution (CVE-2016-4287). \n- use-after-free vulnerabilities that could lead to code execution (CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932)\n- security bypass vulnerabilities that could lead to information disclosure (CVE-2016-4271, CVE-2016-4277, CVE-2016-4278)\n- memory corruption vulnerabilities that could lead to code execution (CVE-2016-4182, CVE-2016-4237, CVE-2016-4238, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, CVE-2016-6924)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1353,SUSE-SLE-WE-12-SP1-2016-1353", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2312-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2312-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162312-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2312-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-September/002274.html" }, { "category": "self", "summary": "SUSE Bug 998589", "url": "https://bugzilla.suse.com/998589" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4182 page", "url": "https://www.suse.com/security/cve/CVE-2016-4182/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4237 page", "url": "https://www.suse.com/security/cve/CVE-2016-4237/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4238 page", "url": "https://www.suse.com/security/cve/CVE-2016-4238/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4271 page", "url": "https://www.suse.com/security/cve/CVE-2016-4271/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4272 page", "url": "https://www.suse.com/security/cve/CVE-2016-4272/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4274 page", "url": "https://www.suse.com/security/cve/CVE-2016-4274/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4275 page", "url": "https://www.suse.com/security/cve/CVE-2016-4275/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4276 page", "url": "https://www.suse.com/security/cve/CVE-2016-4276/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4277 page", "url": "https://www.suse.com/security/cve/CVE-2016-4277/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4278 page", "url": "https://www.suse.com/security/cve/CVE-2016-4278/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4279 page", "url": "https://www.suse.com/security/cve/CVE-2016-4279/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4280 page", "url": "https://www.suse.com/security/cve/CVE-2016-4280/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4281 page", "url": "https://www.suse.com/security/cve/CVE-2016-4281/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4282 page", "url": "https://www.suse.com/security/cve/CVE-2016-4282/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4283 page", "url": "https://www.suse.com/security/cve/CVE-2016-4283/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4284 page", "url": "https://www.suse.com/security/cve/CVE-2016-4284/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4285 page", "url": "https://www.suse.com/security/cve/CVE-2016-4285/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4287 page", "url": "https://www.suse.com/security/cve/CVE-2016-4287/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6921 page", "url": "https://www.suse.com/security/cve/CVE-2016-6921/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6922 page", "url": "https://www.suse.com/security/cve/CVE-2016-6922/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6923 page", "url": "https://www.suse.com/security/cve/CVE-2016-6923/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6924 page", "url": "https://www.suse.com/security/cve/CVE-2016-6924/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6925 page", "url": "https://www.suse.com/security/cve/CVE-2016-6925/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6926 page", "url": "https://www.suse.com/security/cve/CVE-2016-6926/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6927 page", "url": "https://www.suse.com/security/cve/CVE-2016-6927/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6929 page", "url": "https://www.suse.com/security/cve/CVE-2016-6929/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6930 page", "url": "https://www.suse.com/security/cve/CVE-2016-6930/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6931 page", "url": "https://www.suse.com/security/cve/CVE-2016-6931/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6932 page", "url": "https://www.suse.com/security/cve/CVE-2016-6932/" } ], "title": "Security update for flash-player", "tracking": { "current_release_date": "2016-09-15T08:40:57Z", "generator": { "date": "2016-09-15T08:40:57Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2312-1", "initial_release_date": "2016-09-15T08:40:57Z", "revision_history": [ { "date": "2016-09-15T08:40:57Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "flash-player-11.2.202.635-140.1.x86_64", "product": { "name": "flash-player-11.2.202.635-140.1.x86_64", "product_id": "flash-player-11.2.202.635-140.1.x86_64" } }, { "category": "product_version", "name": "flash-player-gnome-11.2.202.635-140.1.x86_64", "product": { "name": "flash-player-gnome-11.2.202.635-140.1.x86_64", "product_id": "flash-player-gnome-11.2.202.635-140.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-player-11.2.202.635-140.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64" }, "product_reference": "flash-player-11.2.202.635-140.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "flash-player-gnome-11.2.202.635-140.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" }, "product_reference": "flash-player-gnome-11.2.202.635-140.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "flash-player-11.2.202.635-140.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64" }, "product_reference": "flash-player-11.2.202.635-140.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "flash-player-gnome-11.2.202.635-140.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" }, "product_reference": "flash-player-gnome-11.2.202.635-140.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4182", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4182" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4182", "url": "https://www.suse.com/security/cve/CVE-2016-4182" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4182", "url": "https://bugzilla.suse.com/988579" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4182", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "important" } ], "title": "CVE-2016-4182" }, { "cve": "CVE-2016-4237", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4237" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4237", "url": "https://www.suse.com/security/cve/CVE-2016-4237" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4237", "url": "https://bugzilla.suse.com/988579" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4237", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "important" } ], "title": "CVE-2016-4237" }, { "cve": "CVE-2016-4238", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4238" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4238", "url": "https://www.suse.com/security/cve/CVE-2016-4238" }, { "category": "external", "summary": "SUSE Bug 988579 for CVE-2016-4238", "url": "https://bugzilla.suse.com/988579" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4238", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "important" } ], "title": "CVE-2016-4238" }, { "cve": "CVE-2016-4271", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4271" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4277 and CVE-2016-4278, aka a \"local-with-filesystem Flash sandbox bypass\" issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4271", "url": "https://www.suse.com/security/cve/CVE-2016-4271" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4271", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4271" }, { "cve": "CVE-2016-4272", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4272" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4272", "url": "https://www.suse.com/security/cve/CVE-2016-4272" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4272", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4272" }, { "cve": "CVE-2016-4274", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4274" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4274", "url": "https://www.suse.com/security/cve/CVE-2016-4274" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4274", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4274" }, { "cve": "CVE-2016-4275", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4275" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4275", "url": "https://www.suse.com/security/cve/CVE-2016-4275" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4275", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4275" }, { "cve": "CVE-2016-4276", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4276" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4276", "url": "https://www.suse.com/security/cve/CVE-2016-4276" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4276", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4276" }, { "cve": "CVE-2016-4277", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4277" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4278.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4277", "url": "https://www.suse.com/security/cve/CVE-2016-4277" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4277", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4277" }, { "cve": "CVE-2016-4278", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4278" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4277.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4278", "url": "https://www.suse.com/security/cve/CVE-2016-4278" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4278", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4278" }, { "cve": "CVE-2016-4279", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4279" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4279", "url": "https://www.suse.com/security/cve/CVE-2016-4279" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4279", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4279" }, { "cve": "CVE-2016-4280", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4280" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4280", "url": "https://www.suse.com/security/cve/CVE-2016-4280" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4280", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4280" }, { "cve": "CVE-2016-4281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4281" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4281", "url": "https://www.suse.com/security/cve/CVE-2016-4281" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4281", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4281" }, { "cve": "CVE-2016-4282", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4282" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4282", "url": "https://www.suse.com/security/cve/CVE-2016-4282" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4282", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4282" }, { "cve": "CVE-2016-4283", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4283" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4283", "url": "https://www.suse.com/security/cve/CVE-2016-4283" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4283", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4283" }, { "cve": "CVE-2016-4284", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4284" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4284", "url": "https://www.suse.com/security/cve/CVE-2016-4284" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4284", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4284" }, { "cve": "CVE-2016-4285", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4285" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-6922, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4285", "url": "https://www.suse.com/security/cve/CVE-2016-4285" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4285", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4285" }, { "cve": "CVE-2016-4287", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4287" } ], "notes": [ { "category": "general", "text": "Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4287", "url": "https://www.suse.com/security/cve/CVE-2016-4287" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-4287", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-4287" }, { "cve": "CVE-2016-6921", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6921" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6921", "url": "https://www.suse.com/security/cve/CVE-2016-6921" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6921", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6921" }, { "cve": "CVE-2016-6922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6922" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6924.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6922", "url": "https://www.suse.com/security/cve/CVE-2016-6922" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6922", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6922" }, { "cve": "CVE-2016-6923", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6923" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6923", "url": "https://www.suse.com/security/cve/CVE-2016-6923" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6923", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6923" }, { "cve": "CVE-2016-6924", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6924" } ], "notes": [ { "category": "general", "text": "Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6922.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6924", "url": "https://www.suse.com/security/cve/CVE-2016-6924" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6924", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6924" }, { "cve": "CVE-2016-6925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6925" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6925", "url": "https://www.suse.com/security/cve/CVE-2016-6925" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6925", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6925" }, { "cve": "CVE-2016-6926", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6926" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6926", "url": "https://www.suse.com/security/cve/CVE-2016-6926" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6926", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6926" }, { "cve": "CVE-2016-6927", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6927" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6927", "url": "https://www.suse.com/security/cve/CVE-2016-6927" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6927", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6927" }, { "cve": "CVE-2016-6929", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6929" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6929", "url": "https://www.suse.com/security/cve/CVE-2016-6929" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6929", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6929" }, { "cve": "CVE-2016-6930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6930" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6931, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6930", "url": "https://www.suse.com/security/cve/CVE-2016-6930" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6930", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6930" }, { "cve": "CVE-2016-6931", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6931" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6932.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6931", "url": "https://www.suse.com/security/cve/CVE-2016-6931" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6931", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6931" }, { "cve": "CVE-2016-6932", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6932" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6931.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6932", "url": "https://www.suse.com/security/cve/CVE-2016-6932" }, { "category": "external", "summary": "SUSE Bug 998589 for CVE-2016-6932", "url": "https://bugzilla.suse.com/998589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-11.2.202.635-140.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:flash-player-gnome-11.2.202.635-140.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-15T08:40:57Z", "details": "moderate" } ], "title": "CVE-2016-6932" } ] }
gsd-2016-6927
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2016-6927", "description": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "id": "GSD-2016-6927", "references": [ "https://www.suse.com/security/cve/CVE-2016-6927.html", "https://access.redhat.com/errata/RHSA-2016:1865", "https://advisories.mageia.org/CVE-2016-6927.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-6927" ], "details": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.", "id": "GSD-2016-6927", "modified": "2023-12-13T01:21:23.291527Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2016-6927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201610-10", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201610-10" }, { "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "RHSA-2016:1865", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "name": "92927", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92927" }, { "name": "1036791", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036791" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "11.2.202.632", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "cpe_name": [], "versionEndIncluding": "18.0.0.366", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe_name": [], "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2016-6927" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "name": "92927", "refsource": "BID", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92927" }, { "name": "GLSA-201610-10", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201610-10" }, { "name": "1036791", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036791" }, { "name": "RHSA-2016:1865", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-19T03:21Z", "publishedDate": "2016-09-14T18:59Z" } } }
cnvd-2016-07688
Vulnerability from cnvd
Title: Adobe Flash Player内存错误引用漏洞(CNVD-2016-07688)
Description:
Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。
Adobe Flash Player中存在内存错误引用漏洞。攻击者可利用该漏洞执行任意代码。
Severity: 高
Patch Name: Adobe Flash Player内存错误引用漏洞(CNVD-2016-07688)的补丁
Patch Description:
Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。
Adobe Flash Player中存在内存错误引用漏洞。攻击者可利用该漏洞执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: https://helpx.adobe.com/security/products/flash-player/apsb16-29.html
Reference: https://helpx.adobe.com/security/products/flash-player/apsb16-29.html
Name | ['Adobe Flash Player(for Microsoft Edge and Internet Explorer 11) <=22.0.0.211', 'Adobe Flash Player(for Google Chrome) <=22.0.0.211', 'Adobe Flash Player Extended Support Release <=18.0.0.366', 'Adobe Flash Player Desktop Runtime <=22.0.0.211', 'Adobe Flash Player(on Linux) <=11.2.202.632'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2016-6927" } }, "description": "Adobe Flash Player\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u8de8\u5c4f\u5e55\u548c\u6d4f\u89c8\u5668\u67e5\u770b\u5e94\u7528\u7a0b\u5e8f\u3001\u5185\u5bb9\u548c\u89c6\u9891\u3002\r\n\r\nAdobe Flash Player\u4e2d\u5b58\u5728\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002", "discovererName": "JieZeng of Tencent Zhanlu Lab working with the Chromium Vulnerability Rewards Program", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-07688", "openTime": "2016-09-19", "patchDescription": "Adobe Flash Player\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u8de8\u5c4f\u5e55\u548c\u6d4f\u89c8\u5668\u67e5\u770b\u5e94\u7528\u7a0b\u5e8f\u3001\u5185\u5bb9\u548c\u89c6\u9891\u3002\r\n\r\nAdobe Flash Player\u4e2d\u5b58\u5728\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Adobe Flash Player\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\uff08CNVD-2016-07688\uff09\u7684\u8865\u4e01", "products": { "product": [ "Adobe Flash Player\uff08for Microsoft Edge and Internet Explorer 11\uff09 \u003c=22.0.0.211", "Adobe Flash Player\uff08for Google Chrome\uff09 \u003c=22.0.0.211", "Adobe Flash Player Extended Support Release \u003c=18.0.0.366", "Adobe Flash Player Desktop Runtime \u003c=22.0.0.211", "Adobe Flash Player(on Linux) \u003c=11.2.202.632" ] }, "referenceLink": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html", "serverity": "\u9ad8", "submitTime": "2016-09-19", "title": "Adobe Flash Player\u5185\u5b58\u9519\u8bef\u5f15\u7528\u6f0f\u6d1e\uff08CNVD-2016-07688\uff09" }
fkie_cve-2016-6927
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
adobe | flash_player | * | |
linux | linux_kernel | - | |
microsoft | windows_10 | - | |
microsoft | windows_8.1 | - | |
adobe | flash_player | * | |
adobe | flash_player | * | |
apple | mac_os_x | - | |
microsoft | windows | - | |
adobe | flash_player_desktop_runtime | * | |
adobe | flash_player | * | |
apple | mac_os_x | - | |
microsoft | windows | - | |
adobe | flash_player | * | |
apple | mac_os_x | - | |
chrome_os | - | ||
linux | linux_kernel | - | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7CA6039-558F-4C74-95A6-5C651DD6884D", "versionEndIncluding": "11.2.202.632", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "matchCriteriaId": "15F5093D-7418-4D20-BFBA-081D69D7AE7F", "versionEndIncluding": "22.0.0.211", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "matchCriteriaId": "CE5BB30B-7DE2-469E-AF95-D552C2BF15F8", "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "186A94B2-FFE5-48FF-BADA-0A8083C6CD3D", "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*", "matchCriteriaId": "7DB6BA20-BD01-4169-AFE3-07DEB17381C9", "versionEndIncluding": "18.0.0.366", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "matchCriteriaId": "156F0DBE-F62C-4596-BF96-9E1224B74494", "versionEndIncluding": "22.0.0.211", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932." }, { "lang": "es", "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n de memoria en Adobe Flash Player en versiones anteriores a 18.0.0.375 y 19.x hasta la versi\u00f3n 23.x en versiones anteriores a 23.0.0.162 en Windows y OS X y en versiones anteriores a 11.2.202.635 en Linux permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931 y CVE-2016-6932." } ], "id": "CVE-2016-6927", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-09-14T18:59:24.110", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92927" }, { "source": "psirt@adobe.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036791" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201610-10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1865.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/92927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb16-29.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201610-10" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.