SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Adobe Flash Player Vendors:   Adobe Systems Incorporated
Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information
SecurityTracker Alert ID:  1027139
SecurityTracker URL:  http://securitytracker.com/id/1027139
CVE Reference:   CVE-2012-2034, CVE-2012-2035, CVE-2012-2036, CVE-2012-2037, CVE-2012-2038, CVE-2012-2039, CVE-2012-2040   (Links to External Site)
Date:  Jun 9 2012
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 11.2.202.235 and prior
Description:   Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user may be able to obtain potentially sensitive information.

A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system or obtain information from the target user's system. The code will run with the privileges of the target user.

A memory corruption flaw may occur [CVE-2012-2034].

A stack overflow may occur [CVE-2012-2035].

An integer overflow may occur [CVE-2012-2036].

A memory corruption flaw may occur [CVE-2012-2037].

A security bypass may allow information disclosure [CVE-2012-2038].

A null dereference may occur [CVE-2012-2039].

A binary planting flaw in the Flash Player installer allows code execution [CVE-2012-2040].

wushi of team509 (via iDefense's Vulnerability Contributor Program), Manuel Caballero at Microsoft Vulnerability Research (MSVR), Haifei Li at Microsoft Malware Protection Center (MMPC) and Microsoft Vulnerability Research (MSVR), Kai Lu of Fortinet's FortiGuard Labs, Mitsuaki Shiraishi (Symantec Japan, Inc.), Tavis Ormandy of the Google Security Team (CVE-2012-2039), and an anonymous researcher reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain potentially sensitive information.

Solution:   The vendor has issued a fix (11.3.300.257 for Windows and Mac, 11.2.202.236 for Linux, 11.3.300.257 for Chrome, 11.1.115.9 for Android 4.x, 11.1.111.10 for Android 3.x).

The vendor's advisory is available at:

http://www.adobe.com/support/security/bulletins/apsb12-14.html

Vendor URL:  www.adobe.com/support/security/bulletins/apsb12-14.html (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  Android, Linux (Any), UNIX (macOS/OS X), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jun 12 2012 (Red Hat Issues Fix) Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information
Red Hat has issued a fix for Red Hat Enterprise Linux 5 and 6.
Jan 14 2013 (RIM Issues Fix for BlackBerry PlayBook) Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information
RIM has issued a fix for BlackBerry PlayBook.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC