CVE-2016-6921

Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
References
Link Resource
http://rhn.redhat.com/errata/RHSA-2016-1865.html Third Party Advisory
http://www.securityfocus.com/bid/92927 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1036791 Broken Link Third Party Advisory VDB Entry
https://helpx.adobe.com/security/products/flash-player/apsb16-29.html Patch Vendor Advisory
https://security.gentoo.org/glsa/201610-10 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*
OR cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

31 Jan 2023, 18:38

Type Values Removed Values Added
CVSS v2 : 10.0
v3 : 9.8
v2 : 9.3
v3 : 8.8
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
First Time Adobe flash Player Desktop Runtime
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-1865.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2016-1865.html - Third Party Advisory
References (CONFIRM) https://helpx.adobe.com/security/products/flash-player/apsb16-29.html - Vendor Advisory (CONFIRM) https://helpx.adobe.com/security/products/flash-player/apsb16-29.html - Patch, Vendor Advisory
References (SECTRACK) http://www.securitytracker.com/id/1036791 - (SECTRACK) http://www.securitytracker.com/id/1036791 - Broken Link, Third Party Advisory, VDB Entry
References (GENTOO) https://security.gentoo.org/glsa/201610-10 - (GENTOO) https://security.gentoo.org/glsa/201610-10 - Third Party Advisory
References (BID) http://www.securityfocus.com/bid/92927 - (BID) http://www.securityfocus.com/bid/92927 - Broken Link, Third Party Advisory, VDB Entry

Information

Published : 2016-09-14 18:59

Updated : 2023-12-10 11:46


NVD link : CVE-2016-6921

Mitre link : CVE-2016-6921

CVE.ORG link : CVE-2016-6921


JSON object : View

Products Affected

microsoft

  • windows_8.1
  • windows_10
  • windows

adobe

  • flash_player
  • flash_player_desktop_runtime

google

  • chrome_os

linux

  • linux_kernel

apple

  • mac_os_x
CWE
CWE-416

Use After Free