Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-4937 (GCVE-0-2018-4937)
Vulnerability from cvelistv5
Published
2018-05-19 17:00
Modified
2024-08-05 05:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Out-of-bounds write
Summary
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Adobe Flash Player 29.0.0.113 and earlier versions |
Version: Adobe Flash Player 29.0.0.113 and earlier versions |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:18:26.958Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "103708",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "44529",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/44529/"
},
{
"name": "RHSA-2018:1119",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "GLSA-201804-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Adobe Flash Player 29.0.0.113 and earlier versions",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Adobe Flash Player 29.0.0.113 and earlier versions"
}
]
}
],
"datePublic": "2018-05-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out-of-bounds write",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-21T09:57:02",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"references": [
{
"name": "103708",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "44529",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/44529/"
},
{
"name": "RHSA-2018:1119",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "GLSA-201804-11",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2018-4937",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Adobe Flash Player 29.0.0.113 and earlier versions",
"version": {
"version_data": [
{
"version_value": "Adobe Flash Player 29.0.0.113 and earlier versions"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-bounds write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "103708",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "44529",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44529/"
},
{
"name": "RHSA-2018:1119",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "GLSA-201804-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2018-4937",
"datePublished": "2018-05-19T17:00:00",
"dateReserved": "2018-01-03T00:00:00",
"dateUpdated": "2024-08-05T05:18:26.958Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-4937\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2018-05-19T17:29:01.387\",\"lastModified\":\"2024-11-21T04:07:44.890\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.\"},{\"lang\":\"es\",\"value\":\"Adobe Flash Player, en versiones 29.0.0.113 y anteriores, tiene una vulnerabilidad explotable de escritura fuera de l\u00edmites. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir la ejecuci\u00f3n arbitraria de c\u00f3digo en el contexto del usuario actual.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"29.0.0.113\",\"matchCriteriaId\":\"E5278C46-1C86-41FF-AE07-FB960DDA5251\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*\",\"versionEndIncluding\":\"29.0.0.113\",\"matchCriteriaId\":\"EE872A2B-4118-419A-8B2A-1486BFE1F48A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*\",\"versionEndIncluding\":\"29.0.0.113\",\"matchCriteriaId\":\"7531B60E-06FF-4F9C-90E0-71B8637D5CF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*\",\"versionEndIncluding\":\"29.0.0.113\",\"matchCriteriaId\":\"C58710D1-1B89-494D-8675-68A93C0ACD37\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21540673-614A-4D40-8BD7-3F07723803B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93068DB-549B-45AB-8E5C-00EB5D8B5CF8\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103708\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040648\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1119\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb18-08.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201804-11\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44529/\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/103708\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:1119\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb18-08.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201804-11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/44529/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}"
}
}
gsd-2018-4937
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2018-4937",
"description": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"id": "GSD-2018-4937",
"references": [
"https://access.redhat.com/errata/RHSA-2018:1119",
"https://packetstormsecurity.com/files/cve/CVE-2018-4937"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-4937"
],
"details": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"id": "GSD-2018-4937",
"modified": "2023-12-13T01:22:28.485515Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2018-4937",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Adobe Flash Player 29.0.0.113 and earlier versions",
"version": {
"version_data": [
{
"version_value": "Adobe Flash Player 29.0.0.113 and earlier versions"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-bounds write"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "103708",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "44529",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/44529/"
},
{
"name": "RHSA-2018:1119",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "GLSA-201804-11",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"refsource": "MISC",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe_name": [],
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe_name": [],
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe_name": [],
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@adobe.com",
"ID": "CVE-2018-4937"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"name": "44529",
"refsource": "EXPLOIT-DB",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44529/"
},
{
"name": "RHSA-2018:1119",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"name": "1040648",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"name": "103708",
"refsource": "BID",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"name": "GLSA-201804-11",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201804-11"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-11-18T17:19Z",
"publishedDate": "2018-05-19T17:29Z"
}
}
}
rhsa-2018_1119
Vulnerability from csaf_redhat
Published
2018-04-11 21:25
Modified
2024-11-15 02:06
Summary
Red Hat Security Advisory: flash-plugin security update
Notes
Topic
An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update upgrades Flash Player to version 29.0.0.140.
Security Fix(es):
* flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) (CVE-2018-4932, CVE-2018-4935, CVE-2018-4937)
* flash-plugin: Information Disclosure vulnerabilities (APSB18-08) (CVE-2018-4933, CVE-2018-4934, CVE-2018-4936)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 29.0.0.140.\n\nSecurity Fix(es):\n\n* flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) (CVE-2018-4932, CVE-2018-4935, CVE-2018-4937)\n\n* flash-plugin: Information Disclosure vulnerabilities (APSB18-08) (CVE-2018-4933, CVE-2018-4934, CVE-2018-4936)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1119",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"category": "external",
"summary": "1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1119.json"
}
],
"title": "Red Hat Security Advisory: flash-plugin security update",
"tracking": {
"current_release_date": "2024-11-15T02:06:55+00:00",
"generator": {
"date": "2024-11-15T02:06:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2018:1119",
"initial_release_date": "2018-04-11T21:25:45+00:00",
"revision_history": [
{
"date": "2018-04-11T21:25:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-11T21:25:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T02:06:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_id": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@29.0.0.140-1.el6_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Client-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Server-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.9.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-4932",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4932"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4933",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4933"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4934",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4934"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4935",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4935"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4936",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4936"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4937",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4937"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4937",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
}
]
}
rhsa-2018:1119
Vulnerability from csaf_redhat
Published
2018-04-11 21:25
Modified
2025-10-09 19:14
Summary
Red Hat Security Advisory: flash-plugin security update
Notes
Topic
An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update upgrades Flash Player to version 29.0.0.140.
Security Fix(es):
* flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) (CVE-2018-4932, CVE-2018-4935, CVE-2018-4937)
* flash-plugin: Information Disclosure vulnerabilities (APSB18-08) (CVE-2018-4933, CVE-2018-4934, CVE-2018-4936)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 29.0.0.140.\n\nSecurity Fix(es):\n\n* flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) (CVE-2018-4932, CVE-2018-4935, CVE-2018-4937)\n\n* flash-plugin: Information Disclosure vulnerabilities (APSB18-08) (CVE-2018-4933, CVE-2018-4934, CVE-2018-4936)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1119",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"category": "external",
"summary": "1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1119.json"
}
],
"title": "Red Hat Security Advisory: flash-plugin security update",
"tracking": {
"current_release_date": "2025-10-09T19:14:53+00:00",
"generator": {
"date": "2025-10-09T19:14:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2018:1119",
"initial_release_date": "2018-04-11T21:25:45+00:00",
"revision_history": [
{
"date": "2018-04-11T21:25:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-11T21:25:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:14:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_id": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@29.0.0.140-1.el6_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Client-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Server-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.9.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-4932",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4932"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4933",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4933"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4934",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4934"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4935",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4935"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4936",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4936"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4937",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4937"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4937",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
}
]
}
RHSA-2018:1119
Vulnerability from csaf_redhat
Published
2018-04-11 21:25
Modified
2025-10-09 19:14
Summary
Red Hat Security Advisory: flash-plugin security update
Notes
Topic
An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update upgrades Flash Player to version 29.0.0.140.
Security Fix(es):
* flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) (CVE-2018-4932, CVE-2018-4935, CVE-2018-4937)
* flash-plugin: Information Disclosure vulnerabilities (APSB18-08) (CVE-2018-4933, CVE-2018-4934, CVE-2018-4936)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 29.0.0.140.\n\nSecurity Fix(es):\n\n* flash-plugin: Remote Code Execution vulnerabilities (APSB18-08) (CVE-2018-4932, CVE-2018-4935, CVE-2018-4937)\n\n* flash-plugin: Information Disclosure vulnerabilities (APSB18-08) (CVE-2018-4933, CVE-2018-4934, CVE-2018-4936)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2018:1119",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"category": "external",
"summary": "1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_1119.json"
}
],
"title": "Red Hat Security Advisory: flash-plugin security update",
"tracking": {
"current_release_date": "2025-10-09T19:14:53+00:00",
"generator": {
"date": "2025-10-09T19:14:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2018:1119",
"initial_release_date": "2018-04-11T21:25:45+00:00",
"revision_history": [
{
"date": "2018-04-11T21:25:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2018-04-11T21:25:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T19:14:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_id": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@29.0.0.140-1.el6_9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
"product_id": "6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Client-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
"product_id": "6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Server-Supplementary-6.9.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:29.0.0.140-1.el6_9.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
"product_id": "6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
},
"product_reference": "flash-plugin-0:29.0.0.140-1.el6_9.i686",
"relates_to_product_reference": "6Workstation-Supplementary-6.9.z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-4932",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4932"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4932"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4933",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4933"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4933"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4934",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4934"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4934"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4935",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4935"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4935"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4935"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4936",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565799"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4936"
},
{
"category": "external",
"summary": "RHBZ#1565799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4936"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-08)"
},
{
"cve": "CVE-2018-4937",
"discovery_date": "2018-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1565800"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-4937"
},
{
"category": "external",
"summary": "RHBZ#1565800",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565800"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-4937",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937"
},
{
"category": "external",
"summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
}
],
"release_date": "2018-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2018-04-11T21:25:45+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Client-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Server-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686",
"6Workstation-Supplementary-6.9.z:flash-plugin-0:29.0.0.140-1.el6_9.i686"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "flash-plugin: Remote Code Execution vulnerabilities (APSB18-08)"
}
]
}
fkie_cve-2018-4937
Vulnerability from fkie_nvd
Published
2018-05-19 17:29
Modified
2024-11-21 04:07
Severity ?
Summary
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@adobe.com | http://www.securityfocus.com/bid/103708 | Broken Link, Third Party Advisory, VDB Entry | |
| psirt@adobe.com | http://www.securitytracker.com/id/1040648 | Broken Link, Third Party Advisory, VDB Entry | |
| psirt@adobe.com | https://access.redhat.com/errata/RHSA-2018:1119 | Third Party Advisory | |
| psirt@adobe.com | https://helpx.adobe.com/security/products/flash-player/apsb18-08.html | Patch, Vendor Advisory | |
| psirt@adobe.com | https://security.gentoo.org/glsa/201804-11 | Third Party Advisory | |
| psirt@adobe.com | https://www.exploit-db.com/exploits/44529/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103708 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040648 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:1119 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/flash-player/apsb18-08.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201804-11 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/44529/ | Exploit, Third Party Advisory, VDB Entry |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| adobe | flash_player_desktop_runtime | * | |
| apple | mac_os_x | - | |
| linux | linux_kernel | - | |
| microsoft | windows | - | |
| adobe | flash_player | * | |
| apple | mac_os_x | - | |
| chrome_os | - | ||
| linux | linux_kernel | - | |
| microsoft | windows | - | |
| adobe | flash_player | * | |
| adobe | flash_player | * | |
| microsoft | windows_10 | - | |
| microsoft | windows_8.1 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5278C46-1C86-41FF-AE07-FB960DDA5251",
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"matchCriteriaId": "EE872A2B-4118-419A-8B2A-1486BFE1F48A",
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"matchCriteriaId": "7531B60E-06FF-4F9C-90E0-71B8637D5CF0",
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"matchCriteriaId": "C58710D1-1B89-494D-8675-68A93C0ACD37",
"versionEndIncluding": "29.0.0.113",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user."
},
{
"lang": "es",
"value": "Adobe Flash Player, en versiones 29.0.0.113 y anteriores, tiene una vulnerabilidad explotable de escritura fuera de l\u00edmites. Su explotaci\u00f3n con \u00e9xito podr\u00eda permitir la ejecuci\u00f3n arbitraria de c\u00f3digo en el contexto del usuario actual."
}
],
"id": "CVE-2018-4937",
"lastModified": "2024-11-21T04:07:44.890",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-05-19T17:29:01.387",
"references": [
{
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"source": "psirt@adobe.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"source": "psirt@adobe.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44529/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103708"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040648"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/44529/"
}
],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
cnvd-2018-09464
Vulnerability from cnvd
Title
Adobe Flash Player代码执行漏洞(CNVD-2018-09464)
Description
Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。
Adobe Flash Player中存在安全漏洞。远程攻击者可利用该漏洞执行任意代码(越界写入)。
Severity
高
VLAI Severity ?
Patch Name
Adobe Flash Player代码执行漏洞(CNVD-2018-09464)的补丁
Patch Description
Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。
Adobe Flash Player中存在安全漏洞。远程攻击者可利用该漏洞执行任意代码(越界写入)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布漏洞修复程序,请及时关注更新: https://helpx.adobe.com/security/products/flash-player/apsb18-08.html
Reference
http://www.securityfocus.com/bid/103708
Impacted products
| Name | ['Adobe Flash Player for Microsoft Edge and Internet Explorer 11 <=29.0.0.113', 'Adobe Flash Player Desktop Runtime <=29.0.0.113', 'Adobe Flash Player for Google Chrome <=29.0.0.113'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "103708"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-4937"
}
},
"description": "Adobe Flash Player\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u8de8\u5c4f\u5e55\u548c\u6d4f\u89c8\u5668\u67e5\u770b\u5e94\u7528\u7a0b\u5e8f\u3001\u5185\u5bb9\u548c\u89c6\u9891\u3002\r\n\r\nAdobe Flash Player\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff08\u8d8a\u754c\u5199\u5165\uff09\u3002",
"discovererName": "Mateusz Jurczyk and Natalie Silvanovich of Google Project Zero, willJ of Tencent PC Manager, and Lin Wang of Beihang University",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://helpx.adobe.com/security/products/flash-player/apsb18-08.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-09464",
"openTime": "2018-05-15",
"patchDescription": "Adobe Flash Player\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u8de8\u5c4f\u5e55\u548c\u6d4f\u89c8\u5668\u67e5\u770b\u5e94\u7528\u7a0b\u5e8f\u3001\u5185\u5bb9\u548c\u89c6\u9891\u3002\r\n\r\nAdobe Flash Player\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\uff08\u8d8a\u754c\u5199\u5165\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Adobe Flash Player\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2018-09464\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Adobe Flash Player for Microsoft Edge and Internet Explorer 11 \u003c=29.0.0.113",
"Adobe Flash Player Desktop Runtime \u003c=29.0.0.113",
"Adobe Flash Player for Google Chrome \u003c=29.0.0.113"
]
},
"referenceLink": "http://www.securityfocus.com/bid/103708",
"serverity": "\u9ad8",
"submitTime": "2018-04-11",
"title": "Adobe Flash Player\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2018-09464\uff09"
}
ghsa-vr3r-r5qq-wvx5
Vulnerability from github
Published
2022-05-14 01:27
Modified
2022-05-14 01:27
Severity ?
VLAI Severity ?
Details
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
{
"affected": [],
"aliases": [
"CVE-2018-4937"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-05-19T17:29:00Z",
"severity": "CRITICAL"
},
"details": "Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.",
"id": "GHSA-vr3r-r5qq-wvx5",
"modified": "2022-05-14T01:27:45Z",
"published": "2022-05-14T01:27:45Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4937"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2018:1119"
},
{
"type": "WEB",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201804-11"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/44529"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/103708"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1040648"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2018-AVI-176
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Adobe. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Adobe | N/A | Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions 29.0.0.113 et antérieures sur Windows 10 et 8.1 | ||
| Adobe | N/A | Adobe Flash Player Desktop Runtime versions 29.0.0.113 et antérieures sur Windows, Macintosh et Linux | ||
| Adobe | ColdFusion | ColdFusion versions 11 Update 13 et antérieures | ||
| Adobe | ColdFusion | ColdFusion versions (2016 release) Update 5 et antérieures | ||
| Adobe | N/A | Adobe Flash Player pour Google Chrome versions 29.0.0.113 et antérieures sur Windows, Macintosh, Linux et Chrome OS |
References
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions 29.0.0.113 et ant\u00e9rieures sur Windows 10 et 8.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player Desktop Runtime versions 29.0.0.113 et ant\u00e9rieures sur Windows, Macintosh et Linux",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "ColdFusion versions 11 Update 13 et ant\u00e9rieures",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "ColdFusion versions (2016 release) Update 5 et ant\u00e9rieures",
"product": {
"name": "ColdFusion",
"vendor": {
"name": "Adobe",
"scada": false
}
}
},
{
"description": "Adobe Flash Player pour Google Chrome versions 29.0.0.113 et ant\u00e9rieures sur Windows, Macintosh, Linux et Chrome OS",
"product": {
"name": "N/A",
"vendor": {
"name": "Adobe",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-4942",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4942"
},
{
"name": "CVE-2018-4938",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4938"
},
{
"name": "CVE-2018-4932",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4932"
},
{
"name": "CVE-2018-4939",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4939"
},
{
"name": "CVE-2018-4941",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4941"
},
{
"name": "CVE-2018-4935",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4935"
},
{
"name": "CVE-2018-4940",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4940"
},
{
"name": "CVE-2018-4934",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4934"
},
{
"name": "CVE-2018-4933",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4933"
},
{
"name": "CVE-2018-4936",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4936"
},
{
"name": "CVE-2018-4937",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4937"
}
],
"initial_release_date": "2018-04-11T00:00:00",
"last_revision_date": "2018-04-11T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-176",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-04-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB18-08 du 10 avril 2018",
"url": "https://helpx.adobe.com/security/products/flash-player/apsb18-08.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB18-14 du 10 avril 2018",
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb18-14.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…