| Vulnerability Name: | CVE-2018-15982 (CCN-153666) | ||||||||||||||||||||||||||||||||
| Assigned: | 2018-12-05 | ||||||||||||||||||||||||||||||||
| Published: | 2018-12-05 | ||||||||||||||||||||||||||||||||
| Updated: | 2019-01-29 | ||||||||||||||||||||||||||||||||
| Summary: | Flash Player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.8 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-416 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-15982 Source: BID Type: Third Party Advisory, VDB Entry 106116 Source: REDHAT Type: Third Party Advisory RHSA-2018:3795 Source: XF Type: UNKNOWN adobe-flash-cve201815982-code-exec(153666) Source: CCN Type: GitHub Repository Windows-RCE-exploits CVE-2018-15982 Source: CCN Type: Adobe Security Bulletin APSB18-42 Security updates available for Adobe Flash Player Source: CONFIRM Type: Patch, Vendor Advisory https://helpx.adobe.com/security/products/flash-player/apsb18-42.html Source: CCN Type: Packet Storm Security [12-24-2018] Adobe Flash Active-X 28.0.0.137 Remote Code Execution Source: CCN Type: 360 Threat Intelligence Center Web site Flash 0day + Hacking Team RAT: Activities of Exploiting Latest Flash 0day Vulnerability and Correlation Analysis Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [12-24-2018] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 46051 Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-15982 | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration 5: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||