Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
References | () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2014-0137.html - Third Party Advisory | |
References | () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
References | () http://www.exploit-db.com/exploits/33212 - Third Party Advisory, VDB Entry | |
References | () http://www.osvdb.org/102849 - Broken Link | |
References | () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/90884 - Third Party Advisory, VDB Entry |
19 Sep 2024, 19:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* |
|
First Time |
Google
Redhat enterprise Linux Server Aus Google chrome Os Redhat enterprise Linux Server Redhat enterprise Linux Eus Redhat enterprise Linux Desktop Suse Opensuse opensuse Redhat Suse linux Enterprise Desktop Redhat enterprise Linux Workstation Google chrome Opensuse Apple macos |
|
CWE | ||
References | () http://googlechromereleases.blogspot.com/2014/02/stable-channel-update.html - Release Notes | |
References | () http://helpx.adobe.com/security/products/flash-player/apsb14-04.html - Broken Link, Patch, Vendor Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00000.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00001.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00006.html - Mailing List | |
References | () http://secunia.com/advisories/56437 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56737 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56780 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56799 - Broken Link, Third Party Advisory | |
References | () http://secunia.com/advisories/56839 - Broken Link, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/65327 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1029715 - Broken Link, Third Party Advisory, VDB Entry | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
18 Sep 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-191 | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 8.8 |
Information
Published : 2014-02-05 05:15
Updated : 2025-04-11 00:51
NVD link : CVE-2014-0497
Mitre link : CVE-2014-0497
CVE.ORG link : CVE-2014-0497
JSON object : View
Products Affected
- chrome
- chrome_os
opensuse
- opensuse
redhat
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_server_aus
adobe
- flash_player
microsoft
- windows
suse
- linux_enterprise_desktop
linux
- linux_kernel
apple
- macos
- mac_os_x
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)