| VID |
50070 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
According to its version, the instance of Flash Player installed on the remote Windows host is equal or prior to 11.7.700.275 / 11.8.x / 11.9.x / 12.x / 13.0.0.182. It is, therefore, potentially affected by a buffer overflow vulnerability due to improper user input validation in the Pixel Bender component. An attacker could cause a buffer overflow with a specially crafted SWF file, resulting in arbitrary code execution.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://helpx.adobe.com/security/products/flash-player/apsb14-13.html https://securelist.com/blog/incidents/59399/new-flash-player-0-day-cve-2014-0515-used-in-watering-hole-attacks/
* Platforms Affected: Adobe Flash Player equal or prior to 13.0.0.182 Apple Mac OS X Any version Linux Any version Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version of Adobe Flash Player (13.0.0.182 later), available from the Adobe Web site at http://get.adobe.com/flashplayer/ |
| Related URL |
CVE-2014-0515 (CVE) |
| Related URL |
67092 (SecurityFocus) |
| Related URL |
(ISS) |
|