Vulnerability CVE-2016-0985


Published: 2016-02-10

Description:
Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK & Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."

Vendor: Redhat
Product: Enterprise linux server supplementary eus 
Version: 6.7z;
Product: Enterprise linux workstation supplementary 
Version: 6.0;
Product: Enterprise linux server supplementary 
Version: 6.0;
Product: Enterprise linux desktop supplementary 
Version: 6.0;
Product: Enterprise linux desktop 
Version: 5.0;
Product: Enterprise linux supplementary 
Version: 5.0;
Vendor: Adobe
Product: Flash player 
Version:
20.0.0.286
20.0.0.235
20.0.0.228
19.0.0.245
19.0.0.226
19.0.0.207
19.0.0.185
18.0.0.326
11.2.202.559
Product: AIR 
Version: 20.0.0.233;
Product: Air sdk \& compiler 
Version: 20.0.0.233;
Product: Air sdk 
Version: 20.0.0.233;
Vendor: Opensuse
Product: Nonfree 
Version: 13.2; 13.1;
Product: Linux enterprise workstation extension 
Version: 12;
Product: Linux enterprise desktop 
Version: 12; 11;
Vendor: Apple
Product: Iphone os 
Product: Mac os x 
Vendor: Google
Product: Android 
Vendor: Microsoft
Product: Windows 
Vendor: Linux
Product: Linux kernel 

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

 References:
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00027.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00029.html
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00030.html
http://rhn.redhat.com/errata/RHSA-2016-0166.html
http://www.securitytracker.com/id/1034970
https://helpx.adobe.com/security/products/flash-player/apsb16-04.html
https://security.gentoo.org/glsa/201603-07
https://www.exploit-db.com/exploits/39461/

Related CVE
CVE-2019-17351
An issue was discovered in drivers/xen/balloon.c in the Linux kernel before 5.2.3, as used in Xen through 4.12.x, allowing guest OS users to cause a denial of service because of unrestricted resource consumption during the mapping of guest memory, ak...
CVE-2019-17133
In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
CVE-2019-17075
An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable. This could allow an attacker to trigger a D...
CVE-2019-17056
llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.
CVE-2019-17055
base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.
CVE-2019-17054
atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.
CVE-2019-17053
ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.
CVE-2019-17052
ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-0614e2b73768.

Copyright 2019, cxsecurity.com

 

Back to Top