CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
96.5%
An updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash Player web browser plug-in.
This update fixes several vulnerabilities in Adobe Flash Player. These vulnerabilities are detailed on the Adobe security page APSB12-22, listed in the References section. Specially crafted SWF content could cause flash-plugin to crash or, potentially, execute arbitrary code when a victim loads a page containing the malicious SWF content.
(CVE-2012-5248, CVE-2012-5249, CVE-2012-5250, CVE-2012-5251, CVE-2012-5252, CVE-2012-5253, CVE-2012-5254, CVE-2012-5255, CVE-2012-5256, CVE-2012-5257, CVE-2012-5258, CVE-2012-5259, CVE-2012-5260, CVE-2012-5261, CVE-2012-5262, CVE-2012-5263, CVE-2012-5264, CVE-2012-5265, CVE-2012-5266, CVE-2012-5267, CVE-2012-5268, CVE-2012-5269, CVE-2012-5270, CVE-2012-5271, CVE-2012-5272)
All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 11.2.202.243.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2012:1346. The text
# itself is copyright (C) Red Hat, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(62471);
script_version("1.28");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2012-5248", "CVE-2012-5249", "CVE-2012-5250", "CVE-2012-5251", "CVE-2012-5252", "CVE-2012-5253", "CVE-2012-5254", "CVE-2012-5255", "CVE-2012-5256", "CVE-2012-5257", "CVE-2012-5258", "CVE-2012-5259", "CVE-2012-5260", "CVE-2012-5261", "CVE-2012-5262", "CVE-2012-5263", "CVE-2012-5264", "CVE-2012-5265", "CVE-2012-5266", "CVE-2012-5267", "CVE-2012-5268", "CVE-2012-5269", "CVE-2012-5270", "CVE-2012-5271", "CVE-2012-5272", "CVE-2012-5285", "CVE-2012-5286", "CVE-2012-5287", "CVE-2012-5673");
script_bugtraq_id(55827);
script_xref(name:"RHSA", value:"2012:1346");
script_name(english:"RHEL 5 / 6 : flash-plugin (RHSA-2012:1346)");
script_summary(english:"Checks the rpm output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Red Hat host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"An updated Adobe Flash Player package that fixes several security
issues is now available for Red Hat Enterprise Linux 5 and 6
Supplementary.
The Red Hat Security Response Team has rated this update as having
critical security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for
each vulnerability from the CVE links in the References section.
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in.
This update fixes several vulnerabilities in Adobe Flash Player. These
vulnerabilities are detailed on the Adobe security page APSB12-22,
listed in the References section. Specially crafted SWF content could
cause flash-plugin to crash or, potentially, execute arbitrary code
when a victim loads a page containing the malicious SWF content.
(CVE-2012-5248, CVE-2012-5249, CVE-2012-5250, CVE-2012-5251,
CVE-2012-5252, CVE-2012-5253, CVE-2012-5254, CVE-2012-5255,
CVE-2012-5256, CVE-2012-5257, CVE-2012-5258, CVE-2012-5259,
CVE-2012-5260, CVE-2012-5261, CVE-2012-5262, CVE-2012-5263,
CVE-2012-5264, CVE-2012-5265, CVE-2012-5266, CVE-2012-5267,
CVE-2012-5268, CVE-2012-5269, CVE-2012-5270, CVE-2012-5271,
CVE-2012-5272)
All users of Adobe Flash Player should install this updated package,
which upgrades Flash Player to version 11.2.202.243."
);
# http://www.adobe.com/support/security/bulletins/apsb12-22.html
script_set_attribute(
attribute:"see_also",
value:"https://www.adobe.com/support/security/bulletins/apsb12-22.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/errata/RHSA-2012:1346"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5249"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5248"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5269"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5268"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5265"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5264"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5267"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5266"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5261"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5260"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5263"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5262"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5254"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5255"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5256"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5257"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5250"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5251"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5252"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5253"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5272"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5258"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5259"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5270"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5271"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5285"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5286"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5287"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2012-5673"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected flash-plugin package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:flash-plugin");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6.3");
script_set_attribute(attribute:"vuln_publication_date", value:"2012/10/09");
script_set_attribute(attribute:"patch_publication_date", value:"2012/10/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/10/10");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Red Hat Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^(5|6)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x / 6.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2012:1346";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (rpm_check(release:"RHEL5", reference:"flash-plugin-11.2.202.243-1.el5")) flag++;
if (rpm_check(release:"RHEL6", reference:"flash-plugin-11.2.202.243-1.el6")) flag++;
if (flag)
{
flash_plugin_caveat = '\n' +
'NOTE: This vulnerability check only applies to RedHat released\n' +
'versions of the flash-plugin package. This check does not apply to\n' +
'Adobe released versions of the flash-plugin package, which are\n' +
'versioned similarly and cause collisions in detection.\n\n' +
'If you are certain you are running the Adobe released package of\n' +
'flash-plugin and are running a version of it equal or higher to the\n' +
'RedHat version listed above then you can consider this a false\n' +
'positive.\n';
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + redhat_report_package_caveat() + flash_plugin_caveat
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "flash-plugin");
}
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5248
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5249
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5250
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5251
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5252
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5253
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5254
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5255
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5256
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5257
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5258
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5259
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5260
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5261
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5262
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5263
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5264
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5265
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5266
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5267
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5268
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5269
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5270
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5271
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5272
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5286
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5287
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5673
access.redhat.com/errata/RHSA-2012:1346
access.redhat.com/security/cve/cve-2012-5248
access.redhat.com/security/cve/cve-2012-5249
access.redhat.com/security/cve/cve-2012-5250
access.redhat.com/security/cve/cve-2012-5251
access.redhat.com/security/cve/cve-2012-5252
access.redhat.com/security/cve/cve-2012-5253
access.redhat.com/security/cve/cve-2012-5254
access.redhat.com/security/cve/cve-2012-5255
access.redhat.com/security/cve/cve-2012-5256
access.redhat.com/security/cve/cve-2012-5257
access.redhat.com/security/cve/cve-2012-5258
access.redhat.com/security/cve/cve-2012-5259
access.redhat.com/security/cve/cve-2012-5260
access.redhat.com/security/cve/cve-2012-5261
access.redhat.com/security/cve/cve-2012-5262
access.redhat.com/security/cve/cve-2012-5263
access.redhat.com/security/cve/cve-2012-5264
access.redhat.com/security/cve/cve-2012-5265
access.redhat.com/security/cve/cve-2012-5266
access.redhat.com/security/cve/cve-2012-5267
access.redhat.com/security/cve/cve-2012-5268
access.redhat.com/security/cve/cve-2012-5269
access.redhat.com/security/cve/cve-2012-5270
access.redhat.com/security/cve/cve-2012-5271
access.redhat.com/security/cve/cve-2012-5272
access.redhat.com/security/cve/cve-2012-5285
access.redhat.com/security/cve/cve-2012-5286
access.redhat.com/security/cve/cve-2012-5287
access.redhat.com/security/cve/cve-2012-5673
www.adobe.com/support/security/bulletins/apsb12-22.html