Vulnerability CVE-2015-3043


Published: 2015-04-14

Description:
Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.

See advisories in our WLB2 database:
Topic
Author
Date
High
Adobe Flash Player Nellymoser Audio Decoding Buffer Overflow
Juan vazquez
06.07.2015

Type:

CWE-noinfo

Vendor: Redhat
Product: Enterprise linux server supplementary eus 
Version: 6.6.z;
Product: Enterprise linux workstation supplementary 
Version: 6.0;
Product: Enterprise linux server supplementary 
Version: 6.0;
Product: Enterprise linux desktop supplementary 
Version: 6.0; 5.0;
Product: Enterprise linux supplementary 
Version: 5.0;
Vendor: Adobe
Product: Flash player 
Version:
17.0.0.134
16.0.0.296
16.0.0.287
16.0.0.257
16.0.0.235
15.0.0.246
15.0.0.239
15.0.0.223
15.0.0.189
15.0.0.167
15.0.0.152
14.0.0.179
14.0.0.176
14.0.0.145
14.0.0.125
13.0.0.264
11.2.202.451
Vendor: Opensuse
Product: Opensuse 
Version: 13.2; 13.1;
Vendor: Novell
Product: Opensuse 
Version: 13.2; 13.1;
Product: Suse linux enterprise workstation extension 
Version: 12.0;
Product: Suse linux enterprise desktop 
Version: 12.0; 11.0;

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html
http://rhn.redhat.com/errata/RHSA-2015-0813.html
http://www.securityfocus.com/bid/74062
http://www.securitytracker.com/id/1032105
https://helpx.adobe.com/security/products/flash-player/apsb15-06.html
https://security.gentoo.org/glsa/201504-07
https://www.exploit-db.com/exploits/37536/

Related CVE
CVE-2016-9597
It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression C...
CVE-2017-9277
The LDAP backend in Novell eDirectory before 9.0 SP4 when switched to EBA (Enhanced Background Authentication) kept open connections without EBA.
CVE-2017-9267
In Novell eDirectory before 9.0.3.1 the LDAP interface was not strictly enforcing cipher restrictions allowing weaker ciphers to be used during SSL BIND operations.
CVE-2017-14491
Heap-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response.
CVE-2017-14496
Integer underflow in the add_pseudoheader function in dnsmasq before 2.78 , when the --add-mac, --add-cpe-id or --add-subnet option is specified, allows remote attackers to cause a denial of service via a crafted DNS request.
CVE-2017-14493
Stack-based buffer overflow in dnsmasq before 2.78 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DHCPv6 request.
CVE-2017-14494
dnsmasq before 2.78, when configured as a relay, allows remote attackers to obtain sensitive memory information via vectors involving handling DHCPv6 forwarded requests.
CVE-2017-13704
In dnsmasq before 2.78, if the DNS packet size does not match the expected size, the size parameter in a memset call gets a negative value. As it is an unsigned value, memset ends up writing up to 0xffffffff zero's (0xffffffffffffffff in 64 bit platf...

Copyright 2019, cxsecurity.com

 

Back to Top