VID |
50070 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
According to its version, the instance of Flash Player installed on the remote Windows host is equal or prior to 11.7.700.275 / 11.8.x / 11.9.x / 12.x / 13.0.0.182. It is, therefore, potentially affected by a buffer overflow vulnerability due to improper user input validation in the Pixel Bender component. An attacker could cause a buffer overflow with a specially crafted SWF file, resulting in arbitrary code execution.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://helpx.adobe.com/security/products/flash-player/apsb14-13.html https://securelist.com/blog/incidents/59399/new-flash-player-0-day-cve-2014-0515-used-in-watering-hole-attacks/
* Platforms Affected: Adobe Flash Player equal or prior to 13.0.0.182 Apple Mac OS X Any version Linux Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of Adobe Flash Player (13.0.0.182 later), available from the Adobe Web site at http://get.adobe.com/flashplayer/ |
Related URL |
CVE-2014-0515 (CVE) |
Related URL |
67092 (SecurityFocus) |
Related URL |
(ISS) |
|