CERTA-2003-AVI-036
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités de Macromedia Flash Player permettent à un utilisateur mal intentionné d'exécuter du code arbitraire.
Description
De multiples vulnérabilités, les unes de type débordement de mémoire, les autres permettant de sortir du contexte sécurisé de l'interpréteur d'objets Flash, ont été corrigées dans la dernière version : Macromedia Flash Player 6,0,79,0.
L'éditeur ne donne pas suffisament d'éléments pour décrire ces vulnérabilités plus en détail.
Solution
La version 6,0,79,0 de Macromedia Flash Player corrige ces vulnérabilités.
http://www.macromedia.com/go/getflashplayer
Tous les logiciels utilisant une version antérieure à 6,0,79,0.
La version 6,0,79,0 de Macromedia Flash Player corrige ces vulnérabilités.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eTous les logiciels utilisant une version ant\u00e9rieure \u00e0 6,0,79,0.\u003c/P\u003e \u003cP\u003eLa version 6,0,79,0 de Macromedia Flash Player corrige ces vuln\u00e9rabilit\u00e9s.\u003c/P\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s, les unes de type d\u00e9bordement de m\u00e9moire,\nles autres permettant de sortir du contexte s\u00e9curis\u00e9 de l\u0027interpr\u00e9teur\nd\u0027objets Flash, ont \u00e9t\u00e9 corrig\u00e9es dans la derni\u00e8re version : Macromedia\nFlash Player 6,0,79,0.\n\nL\u0027\u00e9diteur ne donne pas suffisament d\u0027\u00e9l\u00e9ments pour d\u00e9crire ces\nvuln\u00e9rabilit\u00e9s plus en d\u00e9tail.\n\n## Solution\n\nLa version 6,0,79,0 de Macromedia Flash Player corrige ces\nvuln\u00e9rabilit\u00e9s.\n\n http://www.macromedia.com/go/getflashplayer\n",
"cves": [],
"links": [],
"reference": "CERTA-2003-AVI-036",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2003-03-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s de Macromedia Flash Player permettent \u00e0 un\nutilisateur mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de Macromedia Flash Player",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 MPSB03-03 de Macromedia",
"url": "http://www.macromedia.com/devnet/security/security_zone/mpsb03-03.hyml"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…