| Vulnerability Name: | CVE-2017-11281 (CCN-131557) | ||||||||||||||||
| Assigned: | 2017-09-12 | ||||||||||||||||
| Published: | 2017-09-12 | ||||||||||||||||
| Updated: | 2021-09-08 | ||||||||||||||||
| Summary: | Adobe Flash Player has an exploitable memory corruption vulnerability in the text handling function. Successful exploitation could lead to arbitrary code execution. This affects 26.0.0.151 and earlier. | ||||||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.8 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-11281 Source: BID Type: Third Party Advisory, VDB Entry 100710 Source: CCN Type: BID-100710 Adobe Flash Player CVE-2017-11281 Remote Memory Corruption Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1039314 Source: REDHAT Type: Third Party Advisory RHSA-2017:2702 Source: XF Type: UNKNOWN adobe-flash-cve201711281-code-exec(131557) Source: CCN Type: Adobe Security Bulletin APSB17-28 Security updates available for Adobe Flash Player Source: CONFIRM Type: Patch, Vendor Advisory https://helpx.adobe.com/security/products/flash-player/apsb17-28.html Source: CCN Type: Packet Storm Security [09-26-2017] Adobe Flash MP4 Parsing Out-Of-Bounds Read Source: CCN Type: Packet Storm Security [09-26-2017] Adobe Flash MP4 Edge Processing Out-Of-Bounds Write Source: GENTOO Type: Third Party Advisory, VDB Entry GLSA-201709-16 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [09-25-2017] Source: EXPLOIT-DB Type: Third Party Advisory, VDB Entry 42781 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [09-25-2017] Source: EXPLOIT-DB Type: Third Party Advisory, VDB Entry 42782 Source: MISC Type: Exploit, Third Party Advisory https://www.youtube.com/watch?v=CvmnUeza9zw | ||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Denotes that component is vulnerable | ||||||||||||||||
| Oval Definitions | |||||||||||||||||
| |||||||||||||||||
| BACK | |||||||||||||||||