Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-12824 (GCVE-0-2018-12824)
Vulnerability from cvelistv5
Published
2018-08-29 13:00
Modified
2024-08-05 08:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- out-of-bounds read
Summary
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
References
URL | Tags | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Adobe Flash Player 30.0.0.134 and earlier |
Version: Adobe Flash Player 30.0.0.134 and earlier |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:45:02.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105066", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105066" }, { "name": "RHSA-2018:2435", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "name": "1041448", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041448" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Adobe Flash Player 30.0.0.134 and earlier", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Adobe Flash Player 30.0.0.134 and earlier" } ] } ], "datePublic": "2018-08-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-08-30T09:57:01", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "name": "105066", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105066" }, { "name": "RHSA-2018:2435", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "name": "1041448", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041448" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2018-12824", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Flash Player 30.0.0.134 and earlier", "version": { "version_data": [ { "version_value": "Adobe Flash Player 30.0.0.134 and earlier" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "105066", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105066" }, { "name": "RHSA-2018:2435", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "name": "1041448", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041448" }, { "name": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2018-12824", "datePublished": "2018-08-29T13:00:00", "dateReserved": "2018-06-25T00:00:00", "dateUpdated": "2024-08-05T08:45:02.215Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-12824\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2018-08-29T13:29:00.997\",\"lastModified\":\"2024-11-21T03:45:53.637\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.\"},{\"lang\":\"es\",\"value\":\"Adobe Flash Player, en versiones 30.0.0.134 y anteriores, tiene una vulnerabilidad de lectura fuera de l\u00edmites. Su explotaci\u00f3n con \u00e9xito podr\u00eda resultar en una divulgaci\u00f3n de informaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"30.0.0.154\",\"matchCriteriaId\":\"3DC58E15-92D4-49D5-83B6-662CD26A9DBF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*\",\"versionEndIncluding\":\"30.0.0.154\",\"matchCriteriaId\":\"AB14B614-3CE9-4135-B321-03994AA6DABB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4781BF1E-8A4E-4AFF-9540-23D523EE30DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*\",\"versionEndIncluding\":\"30.0.0.154\",\"matchCriteriaId\":\"B589DCE5-9EDF-4B55-BCA8-124C21AC7A46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*\",\"versionEndIncluding\":\"30.0.0.154\",\"matchCriteriaId\":\"F818E7DE-D510-46FF-A43A-F323BE63FE07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21540673-614A-4D40-8BD7-3F07723803B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E93068DB-549B-45AB-8E5C-00EB5D8B5CF8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/105066\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041448\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2435\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb18-25.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/105066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1041448\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2435\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/flash-player/apsb18-25.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
fkie_cve-2018-12824
Vulnerability from fkie_nvd
Published
2018-08-29 13:29
Modified
2024-11-21 03:45
Severity ?
Summary
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
References
URL | Tags | ||
---|---|---|---|
psirt@adobe.com | http://www.securityfocus.com/bid/105066 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | http://www.securitytracker.com/id/1041448 | Third Party Advisory, VDB Entry | |
psirt@adobe.com | https://access.redhat.com/errata/RHSA-2018:2435 | Third Party Advisory | |
psirt@adobe.com | https://helpx.adobe.com/security/products/flash-player/apsb18-25.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105066 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041448 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:2435 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://helpx.adobe.com/security/products/flash-player/apsb18-25.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | flash_player_desktop_runtime | * | |
apple | mac_os_x | - | |
microsoft | windows | - | |
adobe | flash_player | * | |
apple | mac_os_x | - | |
chrome_os | - | ||
linux | linux_kernel | - | |
microsoft | windows | - | |
adobe | flash_player | * | |
adobe | flash_player | * | |
microsoft | windows_10 | - | |
microsoft | windows_8.1 | - | |
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_workstation | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC58E15-92D4-49D5-83B6-662CD26A9DBF", "versionEndIncluding": "30.0.0.154", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "matchCriteriaId": "AB14B614-3CE9-4135-B321-03994AA6DABB", "versionEndIncluding": "30.0.0.154", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD", "vulnerable": false }, { "criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79", "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "matchCriteriaId": "B589DCE5-9EDF-4B55-BCA8-124C21AC7A46", "versionEndIncluding": "30.0.0.154", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*", "matchCriteriaId": "F818E7DE-D510-46FF-A43A-F323BE63FE07", "versionEndIncluding": "30.0.0.154", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." }, { "lang": "es", "value": "Adobe Flash Player, en versiones 30.0.0.134 y anteriores, tiene una vulnerabilidad de lectura fuera de l\u00edmites. Su explotaci\u00f3n con \u00e9xito podr\u00eda resultar en una divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2018-12824", "lastModified": "2024-11-21T03:45:53.637", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-29T13:29:00.997", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105066" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041448" }, { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "source": "psirt@adobe.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2018-18454
Vulnerability from cnvd
Title
Adobe Flash Player越界读取漏洞(CNVD-2018-18454)
Description
Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。
Adobe Flash Player中存在越界读取漏洞。远程攻击者可利用该漏洞获取敏感信息。
Severity
中
VLAI Severity ?
Patch Name
Adobe Flash Player越界读取漏洞(CNVD-2018-18454)的补丁
Patch Description
Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。
Adobe Flash Player中存在越界读取漏洞。远程攻击者可利用该漏洞获取敏感信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布漏洞修复程序,请及时关注更新: https://helpx.adobe.com/security/products/flash-player/apsb18-25.html
Reference
https://helpx.adobe.com/security/products/flash-player/apsb18-25.html
Impacted products
Name | ['Adobe Flash Player Desktop Runtime <=30.0.0.134', 'Adobe Flash Player for Google Chrome <=30.0.0.134', 'Adobe Flash Player for Microsoft Edge and Internet Explorer 11 <=30.0.0.134'] |
---|
{ "bids": { "bid": { "bidNumber": "105066" } }, "cves": { "cve": { "cveNumber": "CVE-2018-12824" } }, "description": "Adobe Flash Player\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u8de8\u5c4f\u5e55\u548c\u6d4f\u89c8\u5668\u67e5\u770b\u5e94\u7528\u7a0b\u5e8f\u3001\u5185\u5bb9\u548c\u89c6\u9891\u3002\r\n\r\nAdobe Flash Player\u4e2d\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002", "discovererName": "Anonymous working with Trend Micro\u0027s Zero Day Initiative", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-18454", "openTime": "2018-09-11", "patchDescription": "Adobe Flash Player\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u8de8\u5e73\u53f0\u3001\u57fa\u4e8e\u6d4f\u89c8\u5668\u7684\u591a\u5a92\u4f53\u64ad\u653e\u5668\u4ea7\u54c1\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u8de8\u5c4f\u5e55\u548c\u6d4f\u89c8\u5668\u67e5\u770b\u5e94\u7528\u7a0b\u5e8f\u3001\u5185\u5bb9\u548c\u89c6\u9891\u3002\r\n\r\nAdobe Flash Player\u4e2d\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u654f\u611f\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Adobe Flash Player\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff08CNVD-2018-18454\uff09\u7684\u8865\u4e01", "products": { "product": [ "Adobe Flash Player Desktop Runtime \u003c=30.0.0.134", "Adobe Flash Player for Google Chrome \u003c=30.0.0.134", "Adobe Flash Player for Microsoft Edge and Internet Explorer 11 \u003c=30.0.0.134" ] }, "referenceLink": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "serverity": "\u4e2d", "submitTime": "2018-08-15", "title": "Adobe Flash Player\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\uff08CNVD-2018-18454\uff09" }
CERTFR-2018-AVI-389
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Adobe. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Adobe | N/A | Adobe Flash Player pour Google Chrome versions 30.0.0.134 et antérieures sur Windows, macOS, Linux et Chrome OS | ||
Adobe | Acrobat | Acrobat 2017 Classic 2017 versions 2017.011.30096 et antérieures sur Windows et macOS | ||
Adobe | N/A | Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions 30.0.0.134 et antérieures sur Windows 10 et 8.1 | ||
Adobe | Acrobat Reader | Acrobat Reader 2017 Classic 2017 versions 2017.011.30096 et antérieures sur Windows et macOS | ||
Adobe | Acrobat DC | Acrobat DC Continuous versions 2018.011.20055 et antérieures sur Windows et macOS | ||
Adobe | Acrobat DC | Acrobat DC Classic 2015 versions 2015.006.30434 et antérieures sur Windows et macOS | ||
Adobe | Acrobat Reader DC | Acrobat Reader DC Classic 2015 2015.006.30434 et antérieures sur Windows et macOS | ||
Adobe | N/A | Adobe Flash Player Desktop Runtime versions 30.0.0.134 et antérieures sur Windows, macOS et Linux | ||
Adobe | Acrobat Reader DC | Acrobat Reader DC Continuous versions 2018.011.20055 et antérieures sur Windows et macOS |
References
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Adobe Flash Player pour Google Chrome versions 30.0.0.134 et ant\u00e9rieures sur Windows, macOS, Linux et Chrome OS", "product": { "name": "N/A", "vendor": { "name": "Adobe", "scada": false } } }, { "description": "Acrobat 2017 Classic 2017 versions 2017.011.30096 et ant\u00e9rieures sur Windows et macOS", "product": { "name": "Acrobat", "vendor": { "name": "Adobe", "scada": false } } }, { "description": "Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions 30.0.0.134 et ant\u00e9rieures sur Windows 10 et 8.1", "product": { "name": "N/A", "vendor": { "name": "Adobe", "scada": false } } }, { "description": "Acrobat Reader 2017 Classic 2017 versions 2017.011.30096 et ant\u00e9rieures sur Windows et macOS", "product": { "name": "Acrobat Reader", "vendor": { "name": "Adobe", "scada": false } } }, { "description": "Acrobat DC Continuous versions 2018.011.20055 et ant\u00e9rieures sur Windows et macOS", "product": { "name": "Acrobat DC", "vendor": { "name": "Adobe", "scada": false } } }, { "description": "Acrobat DC Classic 2015 versions 2015.006.30434 et ant\u00e9rieures sur Windows et macOS", "product": { "name": "Acrobat DC", "vendor": { "name": "Adobe", "scada": false } } }, { "description": "Acrobat Reader DC Classic 2015 2015.006.30434 et ant\u00e9rieures sur Windows et macOS", "product": { "name": "Acrobat Reader DC", "vendor": { "name": "Adobe", "scada": false } } }, { "description": "Adobe Flash Player Desktop Runtime versions 30.0.0.134 et ant\u00e9rieures sur Windows, macOS et Linux", "product": { "name": "N/A", "vendor": { "name": "Adobe", "scada": false } } }, { "description": "Acrobat Reader DC Continuous versions 2018.011.20055 et ant\u00e9rieures sur Windows et macOS", "product": { "name": "Acrobat Reader DC", "vendor": { "name": "Adobe", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-12825", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12825" }, { "name": "CVE-2018-12808", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12808" }, { "name": "CVE-2018-12826", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12826" }, { "name": "CVE-2018-12799", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12799" }, { "name": "CVE-2018-12827", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12827" }, { "name": "CVE-2018-12828", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12828" }, { "name": "CVE-2018-12824", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12824" } ], "initial_release_date": "2018-08-16T00:00:00", "last_revision_date": "2018-08-16T00:00:00", "links": [], "reference": "CERTFR-2018-AVI-389", "revisions": [ { "description": "Version initiale", "revision_date": "2018-08-16T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Adobe.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Adobe", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB18-25 du 14 ao\u00fbt 2018", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB18-29 du 14 ao\u00fbt 2018", "url": "https://helpx.adobe.com/security/products/acrobat/apsb18-29.html" } ] }
ghsa-2qwg-3h4c-44rq
Vulnerability from github
Published
2022-05-14 02:18
Modified
2022-05-14 02:18
Severity ?
VLAI Severity ?
Details
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
{ "affected": [], "aliases": [ "CVE-2018-12824" ], "database_specific": { "cwe_ids": [ "CWE-125" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-08-29T13:29:00Z", "severity": "MODERATE" }, "details": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "id": "GHSA-2qwg-3h4c-44rq", "modified": "2022-05-14T02:18:44Z", "published": "2022-05-14T02:18:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12824" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "type": "WEB", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/105066" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1041448" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
rhsa-2018_2435
Vulnerability from csaf_redhat
Published
2018-08-15 20:28
Modified
2024-11-15 00:34
Summary
Red Hat Security Advisory: flash-plugin security update
Notes
Topic
An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update upgrades Flash Player to version 30.0.0.154.
Security Fix(es):
* flash-plugin: Information Disclosure vulnerabilities (APSB18-25) (CVE-2018-12824, CVE-2018-12826, CVE-2018-12827)
* flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25) (CVE-2018-12825)
* flash-plugin: Privilege Escalation vulnerability (APSB18-25) (CVE-2018-12828)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 30.0.0.154.\n\nSecurity Fix(es):\n\n* flash-plugin: Information Disclosure vulnerabilities (APSB18-25) (CVE-2018-12824, CVE-2018-12826, CVE-2018-12827)\n\n* flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25) (CVE-2018-12825)\n\n* flash-plugin: Privilege Escalation vulnerability (APSB18-25) (CVE-2018-12828)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2435", "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" }, { "category": "external", "summary": "1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "1616027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616027" }, { "category": "external", "summary": "1616028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616028" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2435.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2024-11-15T00:34:11+00:00", "generator": { "date": "2024-11-15T00:34:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2435", "initial_release_date": "2018-08-15T20:28:53+00:00", "revision_history": [ { "date": "2018-08-15T20:28:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-15T20:28:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T00:34:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "product": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "product_id": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@30.0.0.154-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" }, "product_reference": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" }, "product_reference": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" }, "product_reference": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12824", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616026" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12824" }, { "category": "external", "summary": "RHBZ#1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12824", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12824" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)" }, { "cve": "CVE-2018-12825", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616028" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have a security bypass vulnerability. Successful exploitation could lead to security mitigation bypass.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12825" }, { "category": "external", "summary": "RHBZ#1616028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12825", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12825" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25)" }, { "cve": "CVE-2018-12826", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616026" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12826" }, { "category": "external", "summary": "RHBZ#1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12826", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12826" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)" }, { "cve": "CVE-2018-12827", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616026" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12827" }, { "category": "external", "summary": "RHBZ#1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12827", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12827" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12827", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12827" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)" }, { "cve": "CVE-2018-12828", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616027" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have a \"use of a component with a known vulnerability\" vulnerability. Successful exploitation could lead to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Privilege Escalation vulnerability (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12828" }, { "category": "external", "summary": "RHBZ#1616027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616027" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12828", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12828" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12828", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12828" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Privilege Escalation vulnerability (APSB18-25)" } ] }
RHSA-2018:2435
Vulnerability from csaf_redhat
Published
2018-08-15 20:28
Modified
2025-10-09 18:15
Summary
Red Hat Security Advisory: flash-plugin security update
Notes
Topic
An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update upgrades Flash Player to version 30.0.0.154.
Security Fix(es):
* flash-plugin: Information Disclosure vulnerabilities (APSB18-25) (CVE-2018-12824, CVE-2018-12826, CVE-2018-12827)
* flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25) (CVE-2018-12825)
* flash-plugin: Privilege Escalation vulnerability (APSB18-25) (CVE-2018-12828)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 30.0.0.154.\n\nSecurity Fix(es):\n\n* flash-plugin: Information Disclosure vulnerabilities (APSB18-25) (CVE-2018-12824, CVE-2018-12826, CVE-2018-12827)\n\n* flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25) (CVE-2018-12825)\n\n* flash-plugin: Privilege Escalation vulnerability (APSB18-25) (CVE-2018-12828)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2435", "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" }, { "category": "external", "summary": "1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "1616027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616027" }, { "category": "external", "summary": "1616028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616028" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2435.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2025-10-09T18:15:39+00:00", "generator": { "date": "2025-10-09T18:15:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2018:2435", "initial_release_date": "2018-08-15T20:28:53+00:00", "revision_history": [ { "date": "2018-08-15T20:28:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-15T20:28:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T18:15:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "product": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "product_id": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@30.0.0.154-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" }, "product_reference": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" }, "product_reference": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" }, "product_reference": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12824", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616026" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12824" }, { "category": "external", "summary": "RHBZ#1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12824", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12824" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)" }, { "cve": "CVE-2018-12825", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616028" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have a security bypass vulnerability. Successful exploitation could lead to security mitigation bypass.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12825" }, { "category": "external", "summary": "RHBZ#1616028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12825", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12825" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25)" }, { "cve": "CVE-2018-12826", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616026" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12826" }, { "category": "external", "summary": "RHBZ#1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12826", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12826" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)" }, { "cve": "CVE-2018-12827", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616026" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12827" }, { "category": "external", "summary": "RHBZ#1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12827", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12827" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12827", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12827" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)" }, { "cve": "CVE-2018-12828", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616027" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have a \"use of a component with a known vulnerability\" vulnerability. Successful exploitation could lead to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Privilege Escalation vulnerability (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12828" }, { "category": "external", "summary": "RHBZ#1616027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616027" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12828", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12828" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12828", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12828" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Privilege Escalation vulnerability (APSB18-25)" } ] }
rhsa-2018:2435
Vulnerability from csaf_redhat
Published
2018-08-15 20:28
Modified
2025-10-09 18:15
Summary
Red Hat Security Advisory: flash-plugin security update
Notes
Topic
An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update upgrades Flash Player to version 30.0.0.154.
Security Fix(es):
* flash-plugin: Information Disclosure vulnerabilities (APSB18-25) (CVE-2018-12824, CVE-2018-12826, CVE-2018-12827)
* flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25) (CVE-2018-12825)
* flash-plugin: Privilege Escalation vulnerability (APSB18-25) (CVE-2018-12828)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.\n\nThis update upgrades Flash Player to version 30.0.0.154.\n\nSecurity Fix(es):\n\n* flash-plugin: Information Disclosure vulnerabilities (APSB18-25) (CVE-2018-12824, CVE-2018-12826, CVE-2018-12827)\n\n* flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25) (CVE-2018-12825)\n\n* flash-plugin: Privilege Escalation vulnerability (APSB18-25) (CVE-2018-12828)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2435", "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" }, { "category": "external", "summary": "1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "1616027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616027" }, { "category": "external", "summary": "1616028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616028" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2435.json" } ], "title": "Red Hat Security Advisory: flash-plugin security update", "tracking": { "current_release_date": "2025-10-09T18:15:39+00:00", "generator": { "date": "2025-10-09T18:15:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2018:2435", "initial_release_date": "2018-08-15T20:28:53+00:00", "revision_history": [ { "date": "2018-08-15T20:28:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-15T20:28:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T18:15:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "product": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "product_id": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/flash-plugin@30.0.0.154-1.el6_10?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" }, "product_reference": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" }, "product_reference": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "flash-plugin-0:30.0.0.154-1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" }, "product_reference": "flash-plugin-0:30.0.0.154-1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-12824", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616026" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12824" }, { "category": "external", "summary": "RHBZ#1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12824", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12824" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)" }, { "cve": "CVE-2018-12825", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616028" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have a security bypass vulnerability. Successful exploitation could lead to security mitigation bypass.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12825" }, { "category": "external", "summary": "RHBZ#1616028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12825", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12825" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Security Mitigation Bypass vulnerability (APSB18-25)" }, { "cve": "CVE-2018-12826", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616026" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12826" }, { "category": "external", "summary": "RHBZ#1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12826", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12826" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)" }, { "cve": "CVE-2018-12827", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616026" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12827" }, { "category": "external", "summary": "RHBZ#1616026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12827", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12827" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12827", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12827" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Information Disclosure vulnerabilities (APSB18-25)" }, { "cve": "CVE-2018-12828", "discovery_date": "2018-08-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616027" } ], "notes": [ { "category": "description", "text": "Adobe Flash Player 30.0.0.134 and earlier have a \"use of a component with a known vulnerability\" vulnerability. Successful exploitation could lead to privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "flash-plugin: Privilege Escalation vulnerability (APSB18-25)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12828" }, { "category": "external", "summary": "RHBZ#1616027", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616027" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12828", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12828" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12828", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12828" }, { "category": "external", "summary": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-15T20:28:53+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Server-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686", "6Workstation-Supplementary-6.10.z:flash-plugin-0:30.0.0.154-1.el6_10.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "flash-plugin: Privilege Escalation vulnerability (APSB18-25)" } ] }
gsd-2018-12824
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2018-12824", "description": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "id": "GSD-2018-12824", "references": [ "https://access.redhat.com/errata/RHSA-2018:2435", "https://advisories.mageia.org/CVE-2018-12824.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-12824" ], "details": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.", "id": "GSD-2018-12824", "modified": "2023-12-13T01:22:30.297469Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2018-12824", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Adobe Flash Player 30.0.0.134 and earlier", "version": { "version_data": [ { "version_value": "Adobe Flash Player 30.0.0.134 and earlier" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "105066", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105066" }, { "name": "RHSA-2018:2435", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "name": "1041448", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041448" }, { "name": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "refsource": "CONFIRM", "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "30.0.0.154", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe_name": [], "versionEndIncluding": "30.0.0.154", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe_name": [], "versionEndIncluding": "30.0.0.154", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*", "cpe_name": [], "versionEndIncluding": "30.0.0.154", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "ID": "CVE-2018-12824" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Adobe Flash Player 30.0.0.134 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://helpx.adobe.com/security/products/flash-player/apsb18-25.html" }, { "name": "RHSA-2018:2435", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2435" }, { "name": "1041448", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041448" }, { "name": "105066", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/105066" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } }, "lastModifiedDate": "2018-10-29T20:23Z", "publishedDate": "2018-08-29T13:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…