Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BlendMode class. Successful exploitation could lead to arbitrary code execution.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/98349 | Broken Link Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038427 | Broken Link Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:1219 | Third Party Advisory |
https://helpx.adobe.com/security/products/flash-player/apsb17-15.html | Patch Vendor Advisory |
https://security.gentoo.org/glsa/201705-12 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
|
History
27 Jan 2023, 18:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat enterprise Linux
Adobe flash Player Desktop Runtime |
|
CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:* cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* |
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 8.8 |
CWE | CWE-787 | |
References | (CONFIRM) https://helpx.adobe.com/security/products/flash-player/apsb17-15.html - Patch, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/98349 - Broken Link, Third Party Advisory, VDB Entry | |
References | (SECTRACK) http://www.securitytracker.com/id/1038427 - Broken Link, Third Party Advisory, VDB Entry |
26 Nov 2021, 18:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* |
|
References | (GENTOO) https://security.gentoo.org/glsa/201705-12 - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id/1038427 - Third Party Advisory, VDB Entry | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2017:1219 - Third Party Advisory |
22 Sep 2021, 14:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
Information
Published : 2017-05-09 16:29
Updated : 2023-12-10 12:01
NVD link : CVE-2017-3069
Mitre link : CVE-2017-3069
CVE.ORG link : CVE-2017-3069
JSON object : View
Products Affected
- chrome_os
redhat
- enterprise_linux
- enterprise_linux_desktop
- enterprise_linux_workstation
apple
- mac_os_x
adobe
- flash_player_desktop_runtime
- flash_player
microsoft
- windows
- windows_8.1
- windows_10
linux
- linux_kernel
CWE
CWE-787
Out-of-bounds Write