| Vulnerability Name: | CVE-2008-4473 (CCN-45914) | ||||||||
| Assigned: | 2008-10-15 | ||||||||
| Published: | 2008-10-15 | ||||||||
| Updated: | 2018-10-11 | ||||||||
| Summary: | Multiple heap-based buffer overflows in Adobe Flash CS3 Professional on Windows and Flash MX 2004 allow remote attackers to execute arbitrary code via an SWF file containing long control parameters. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-119 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2008-4473 Source: CCN Type: SA32246 Adobe Flash CS3 SWF Processing Buffer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 32246 Source: MISC Type: UNKNOWN http://security-assessment.com/files/advisories/2008-10-16_Multiple_Flash_Authoring_Heap_Overflows.pdf Source: SREASON Type: UNKNOWN 4429 Source: CCN Type: SECTRACK ID: 1021060 Adobe Flash CS3 Professional Bug Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1021060 Source: CCN Type: Adobe Product Security Advisory APSA08-09 Potential vulnerability in Flash CS3 Professional Source: CONFIRM Type: Vendor Advisory http://www.adobe.com/support/security/advisories/apsa08-09.html Source: CCN Type: OSVDB ID: 49136 Adobe Flash CS3 Crafted SWF File Handling Overflow Source: BUGTRAQ Type: UNKNOWN 20081015 Multiple Flash Authoring Heap Overflows - Malformed SWF Files Source: BID Type: UNKNOWN 31769 Source: CCN Type: BID-31769 Adobe Flash CS3 Professional SWF File Heap Buffer Overflow Vulnerability Source: VUPEN Type: UNKNOWN ADV-2008-2837 Source: XF Type: UNKNOWN adobe-flash-cs3-bo(45914) Source: XF Type: UNKNOWN adobe-flash-cs3-bo(45914) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||