SB2011051201 - Multiple vulnerabilities in Adobe Flash Player
Published: May 12, 2011 Updated: December 27, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 12 secuirty vulnerabilities.
1) Integer Overflow or Wraparound (CVE-ID: CVE-2011-0628)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to integer overflow when handling a long array object by ActionScript. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
2) Memory corruption (CVE-ID: CVE-2011-0627)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error in the Flash Player authplay.dll component. A remote attacker can create a specially crafted Flash (.swf) file embedded in a Microsoft Word (.doc) or Microsoft Excel (.xls) file, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: this vulnerability is being actively exploited.
3) Buffer overflow (CVE-ID: CVE-2011-0626)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to buffer overflow caused by improper bounds checking. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
4) Buffer overflow (CVE-ID: CVE-2011-0625)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to buffer overflow caused by improper bounds checking. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
5) Buffer overflow (CVE-ID: CVE-2011-0624)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to buffer overflow caused by improper bounds checking. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
6) Buffer overflow (CVE-ID: CVE-2011-0623)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to buffer overflow caused by improper bounds checking. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
7) Memory corruption (CVE-ID: CVE-2011-0622)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
8) Memory corruption (CVE-ID: CVE-2011-0621)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
9) Memory corruption (CVE-ID: CVE-2011-0620)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
10) Memory corruption (CVE-ID: CVE-2011-0619)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
11) Integer Overflow (CVE-ID: CVE-2011-0618)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to integer overflow. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.
12) Information disclosure (CVE-ID: CVE-2011-0579)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to design flaw. A remote attacker can create a specially crafted Web site, trick the victim into visiting it and gain access to important data.
Successful exploitation of the vulnerability results in information disclosure on the vulnerable system.
Remediation
Install update from vendor's website.