ID REDHAT-RHSA-2015-2024.NASL Type nessus Reporter This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-02T00:00:00
Description
An updated Adobe Flash Player package that fixes multiple security
issues is now available for Red Hat Enterprise Linux 5 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in.
This update fixes multiple vulnerabilities in Adobe Flash Player.
These vulnerabilities, detailed in the Adobe Security Bulletins
APSB15-25, APSB15-27, and APSB15-28 listed in the References section,
could allow an attacker to create a specially crafted SWF file that
would cause flash-plugin to crash, execute arbitrary code, or disclose
sensitive information when the victim loaded a page containing the
malicious SWF content. (CVE-2015-5569, CVE-2015-7625, CVE-2015-7626,
CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630,
CVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634,
CVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638,
CVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642,
CVE-2015-7643, CVE-2015-7644, CVE-2015-7645, CVE-2015-7647,
CVE-2015-7648, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,
CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,
CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,
CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,
CVE-2015-8044, CVE-2015-8046)
All users of Adobe Flash Player should install this updated package,
which upgrades Flash Player to version 11.2.202.548.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2015:2024. The text
# itself is copyright (C) Red Hat, Inc.
#
include("compat.inc");
if (description)
{
script_id(86862);
script_version("2.15");
script_cvs_date("Date: 2019/10/24 15:35:40");
script_cve_id("CVE-2015-5569", "CVE-2015-7625", "CVE-2015-7626", "CVE-2015-7627", "CVE-2015-7628", "CVE-2015-7629", "CVE-2015-7630", "CVE-2015-7631", "CVE-2015-7632", "CVE-2015-7633", "CVE-2015-7634", "CVE-2015-7635", "CVE-2015-7636", "CVE-2015-7637", "CVE-2015-7638", "CVE-2015-7639", "CVE-2015-7640", "CVE-2015-7641", "CVE-2015-7642", "CVE-2015-7643", "CVE-2015-7644", "CVE-2015-7645", "CVE-2015-7647", "CVE-2015-7648", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7653", "CVE-2015-7654", "CVE-2015-7655", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7658", "CVE-2015-7659", "CVE-2015-7660", "CVE-2015-7661", "CVE-2015-7662", "CVE-2015-7663", "CVE-2015-8042", "CVE-2015-8043", "CVE-2015-8044", "CVE-2015-8046");
script_xref(name:"RHSA", value:"2015:2024");
script_name(english:"RHEL 5 : flash-plugin (RHSA-2015:2024)");
script_summary(english:"Checks the rpm output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Red Hat host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"An updated Adobe Flash Player package that fixes multiple security
issues is now available for Red Hat Enterprise Linux 5 Supplementary.
Red Hat Product Security has rated this update as having Critical
security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
The flash-plugin package contains a Mozilla Firefox compatible Adobe
Flash Player web browser plug-in.
This update fixes multiple vulnerabilities in Adobe Flash Player.
These vulnerabilities, detailed in the Adobe Security Bulletins
APSB15-25, APSB15-27, and APSB15-28 listed in the References section,
could allow an attacker to create a specially crafted SWF file that
would cause flash-plugin to crash, execute arbitrary code, or disclose
sensitive information when the victim loaded a page containing the
malicious SWF content. (CVE-2015-5569, CVE-2015-7625, CVE-2015-7626,
CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630,
CVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634,
CVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638,
CVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642,
CVE-2015-7643, CVE-2015-7644, CVE-2015-7645, CVE-2015-7647,
CVE-2015-7648, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,
CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,
CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,
CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,
CVE-2015-8044, CVE-2015-8046)
All users of Adobe Flash Player should install this updated package,
which upgrades Flash Player to version 11.2.202.548."
);
script_set_attribute(
attribute:"see_also",
value:"https://helpx.adobe.com/security/products/flash-player/apsb15-25.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://helpx.adobe.com/security/products/flash-player/apsb15-27.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/errata/RHSA-2015:2024"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7643"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7644"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7633"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7634"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7626"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7627"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7625"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7631"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7630"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-5569"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7632"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7628"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7629"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7635"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7636"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7637"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7638"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7639"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7640"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7641"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7642"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7648"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7645"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7647"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7657"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7656"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7655"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7654"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7653"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7652"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7651"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-8046"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7662"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7663"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7660"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7661"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7659"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-7658"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-8044"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-8043"
);
script_set_attribute(
attribute:"see_also",
value:"https://access.redhat.com/security/cve/cve-2015-8042"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected flash-plugin package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:flash-plugin");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
script_set_attribute(attribute:"patch_publication_date", value:"2015/11/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/11/12");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Red Hat Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = eregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! ereg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 5.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2015:2024";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (rpm_check(release:"RHEL5", reference:"flash-plugin-11.2.202.548-1.el5")) flag++;
if (flag)
{
flash_plugin_caveat = '\n' +
'NOTE: This vulnerability check only applies to RedHat released\n' +
'versions of the flash-plugin package. This check does not apply to\n' +
'Adobe released versions of the flash-plugin package, which are\n' +
'versioned similarly and cause collisions in detection.\n\n' +
'If you are certain you are running the Adobe released package of\n' +
'flash-plugin and are running a version of it equal or higher to the\n' +
'RedHat version listed above then you can consider this a false\n' +
'positive.\n';
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + redhat_report_package_caveat() + flash_plugin_caveat
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "flash-plugin");
}
}
{"id": "REDHAT-RHSA-2015-2024.NASL", "bulletinFamily": "scanner", "title": "RHEL 5 : flash-plugin (RHSA-2015:2024)", "description": "An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 5 Supplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletins\nAPSB15-25, APSB15-27, and APSB15-28 listed in the References section,\ncould allow an attacker to create a specially crafted SWF file that\nwould cause flash-plugin to crash, execute arbitrary code, or disclose\nsensitive information when the victim loaded a page containing the\nmalicious SWF content. (CVE-2015-5569, CVE-2015-7625, CVE-2015-7626,\nCVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630,\nCVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634,\nCVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638,\nCVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642,\nCVE-2015-7643, CVE-2015-7644, CVE-2015-7645, CVE-2015-7647,\nCVE-2015-7648, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\nCVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\nCVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,\nCVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\nCVE-2015-8044, CVE-2015-8046)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.548.", "published": "2015-11-12T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/86862", "reporter": "This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://access.redhat.com/security/cve/cve-2015-7625", "https://access.redhat.com/security/cve/cve-2015-7644", "https://access.redhat.com/security/cve/cve-2015-7640", "https://access.redhat.com/security/cve/cve-2015-7635", "https://access.redhat.com/security/cve/cve-2015-7658", "https://access.redhat.com/security/cve/cve-2015-8044", "https://access.redhat.com/security/cve/cve-2015-7654", "https://access.redhat.com/security/cve/cve-2015-7660", "https://access.redhat.com/security/cve/cve-2015-7631", "https://access.redhat.com/security/cve/cve-2015-7653", "https://access.redhat.com/security/cve/cve-2015-7652", "https://access.redhat.com/security/cve/cve-2015-7642", "https://access.redhat.com/security/cve/cve-2015-7641", "https://access.redhat.com/security/cve/cve-2015-7638", "https://access.redhat.com/security/cve/cve-2015-7647", "https://access.redhat.com/errata/RHSA-2015:2024", "https://access.redhat.com/security/cve/cve-2015-7645", "https://access.redhat.com/security/cve/cve-2015-7659", "https://helpx.adobe.com/security/products/flash-player/apsb15-25.html", "https://access.redhat.com/security/cve/cve-2015-7656", "https://helpx.adobe.com/security/products/flash-player/apsb15-28.html", "https://access.redhat.com/security/cve/cve-2015-7643", "https://access.redhat.com/security/cve/cve-2015-7637", "https://access.redhat.com/security/cve/cve-2015-7657", "https://access.redhat.com/security/cve/cve-2015-5569", "https://helpx.adobe.com/security/products/flash-player/apsb15-27.html", "https://access.redhat.com/security/cve/cve-2015-7661", "https://access.redhat.com/security/cve/cve-2015-7632", "https://access.redhat.com/security/cve/cve-2015-7651", "https://access.redhat.com/security/cve/cve-2015-7662", "https://access.redhat.com/security/cve/cve-2015-7630", "https://access.redhat.com/security/cve/cve-2015-8046", "https://access.redhat.com/security/cve/cve-2015-7633", "https://access.redhat.com/security/cve/cve-2015-7628", "https://access.redhat.com/security/cve/cve-2015-7626", "https://access.redhat.com/security/cve/cve-2015-7655", "https://access.redhat.com/security/cve/cve-2015-7663", "https://access.redhat.com/security/cve/cve-2015-7629", "https://access.redhat.com/security/cve/cve-2015-8042", "https://access.redhat.com/security/cve/cve-2015-7636", "https://access.redhat.com/security/cve/cve-2015-7648", "https://access.redhat.com/security/cve/cve-2015-7639", "https://access.redhat.com/security/cve/cve-2015-8043", "https://access.redhat.com/security/cve/cve-2015-7627", "https://access.redhat.com/security/cve/cve-2015-7634"], "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7635", "CVE-2015-7652", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7640", "CVE-2015-7647", "CVE-2015-7637", "CVE-2015-7656", "CVE-2015-7638", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7636", "CVE-2015-7626", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-7648", "CVE-2015-7639", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7645", "CVE-2015-7642", "CVE-2015-7632", "CVE-2015-7641", "CVE-2015-8044", "CVE-2015-7631", "CVE-2015-7644", "CVE-2015-7659", "CVE-2015-7662"], "type": "nessus", "lastseen": "2021-01-01T05:05:53", "edition": 26, "viewCount": 5, "enchantments": {"dependencies": {"references": [{"type": "redhat", "idList": ["RHSA-2015:1913", "RHSA-2015:2023", "RHSA-2015:2024", "RHSA-2015:1893"]}, {"type": "gentoo", "idList": ["GLSA-201511-02"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310121422", "OPENVAS:1361412562310131130", "OPENVAS:1361412562310806096", "OPENVAS:1361412562310806617", "OPENVAS:1361412562310806616", "OPENVAS:1361412562310806093", "OPENVAS:1361412562310806097", "OPENVAS:1361412562310806095", "OPENVAS:1361412562310806619", "OPENVAS:1361412562310806094"]}, {"type": "nessus", "idList": ["SUSE_SU-2015-1958-1.NASL", "OPENSUSE-2015-738.NASL", "REDHAT-RHSA-2015-2023.NASL", "ADOBE_AIR_APSB15-28.NASL", "GENTOO_GLSA-201511-02.NASL", "MACOSX_ADOBE_AIR_APSB15-28.NASL", "SUSE_SU-2015-1960-1.NASL", "FREEBSD_PKG_547FBD988B1F11E5B48BBCAEC565249C.NASL", "MACOSX_FLASH_PLAYER_APSB15-28.NASL", "REDHAT-RHSA-2015-1893.NASL"]}, {"type": "kaspersky", "idList": ["KLA10684", "KLA10690", "KLA10679", "KLA10691"]}, {"type": "archlinux", "idList": ["ASA-201510-7", "ASA-201511-5"]}, {"type": "freebsd", "idList": ["547FBD98-8B1F-11E5-B48B-BCAEC565249C", "A63F2C06-726B-11E5-A12B-BCAEC565249C"]}, {"type": "suse", "idList": ["SUSE-SU-2015:1740-1", "OPENSUSE-SU-2015:1744-1", "SUSE-SU-2015:1742-1"]}, {"type": "cve", "idList": ["CVE-2015-7653", "CVE-2015-7625", "CVE-2015-7634", "CVE-2015-7631", "CVE-2015-7629", "CVE-2015-7630", "CVE-2015-7657", "CVE-2015-7641", "CVE-2015-7647", "CVE-2015-7627"]}, {"type": "thn", "idList": ["THN:99BDD62C6BCF9B3765B670679C0892A8"]}], "modified": "2021-01-01T05:05:53", "rev": 2}, "score": {"value": 8.8, "vector": "NONE", "modified": "2021-01-01T05:05:53", "rev": 2}, "vulnersScore": 8.8}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:2024. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86862);\n script_version(\"2.15\");\n script_cvs_date(\"Date: 2019/10/24 15:35:40\");\n\n script_cve_id(\"CVE-2015-5569\", \"CVE-2015-7625\", \"CVE-2015-7626\", \"CVE-2015-7627\", \"CVE-2015-7628\", \"CVE-2015-7629\", \"CVE-2015-7630\", \"CVE-2015-7631\", \"CVE-2015-7632\", \"CVE-2015-7633\", \"CVE-2015-7634\", \"CVE-2015-7635\", \"CVE-2015-7636\", \"CVE-2015-7637\", \"CVE-2015-7638\", \"CVE-2015-7639\", \"CVE-2015-7640\", \"CVE-2015-7641\", \"CVE-2015-7642\", \"CVE-2015-7643\", \"CVE-2015-7644\", \"CVE-2015-7645\", \"CVE-2015-7647\", \"CVE-2015-7648\", \"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n script_xref(name:\"RHSA\", value:\"2015:2024\");\n\n script_name(english:\"RHEL 5 : flash-plugin (RHSA-2015:2024)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 5 Supplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletins\nAPSB15-25, APSB15-27, and APSB15-28 listed in the References section,\ncould allow an attacker to create a specially crafted SWF file that\nwould cause flash-plugin to crash, execute arbitrary code, or disclose\nsensitive information when the victim loaded a page containing the\nmalicious SWF content. (CVE-2015-5569, CVE-2015-7625, CVE-2015-7626,\nCVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630,\nCVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634,\nCVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638,\nCVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642,\nCVE-2015-7643, CVE-2015-7644, CVE-2015-7645, CVE-2015-7647,\nCVE-2015-7648, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\nCVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\nCVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661,\nCVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\nCVE-2015-8044, CVE-2015-8046)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.548.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-25.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-27.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:2024\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7644\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7633\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7634\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7626\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7627\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7631\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7630\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-5569\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7632\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7628\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7635\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7636\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7637\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7638\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7639\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7640\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7641\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7642\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7648\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7647\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7657\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7656\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7653\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7651\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8046\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7662\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7663\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7661\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8043\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8042\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-plugin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:flash-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:5\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/12\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = eregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! ereg(pattern:\"^5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 5.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:2024\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL5\", reference:\"flash-plugin-11.2.202.548-1.el5\")) flag++;\n\n if (flag)\n {\n flash_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check only applies to RedHat released\\n' +\n 'versions of the flash-plugin package. This check does not apply to\\n' +\n 'Adobe released versions of the flash-plugin package, which are\\n' +\n 'versioned similarly and cause collisions in detection.\\n\\n' +\n\n 'If you are certain you are running the Adobe released package of\\n' +\n 'flash-plugin and are running a version of it equal or higher to the\\n' +\n 'RedHat version listed above then you can consider this a false\\n' +\n 'positive.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat() + flash_plugin_caveat\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-plugin\");\n }\n}\n", "naslFamily": "Red Hat Local Security Checks", "pluginID": "86862", "cpe": ["cpe:/o:redhat:enterprise_linux:5", "p-cpe:/a:redhat:enterprise_linux:flash-plugin"], "scheme": null}
{"redhat": [{"lastseen": "2019-05-29T14:35:33", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5569", "CVE-2015-7625", "CVE-2015-7626", "CVE-2015-7627", "CVE-2015-7628", "CVE-2015-7629", "CVE-2015-7630", "CVE-2015-7631", "CVE-2015-7632", "CVE-2015-7633", "CVE-2015-7634", "CVE-2015-7635", "CVE-2015-7636", "CVE-2015-7637", "CVE-2015-7638", "CVE-2015-7639", "CVE-2015-7640", "CVE-2015-7641", "CVE-2015-7642", "CVE-2015-7643", "CVE-2015-7644", "CVE-2015-7645", "CVE-2015-7647", "CVE-2015-7648", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7653", "CVE-2015-7654", "CVE-2015-7655", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7658", "CVE-2015-7659", "CVE-2015-7660", "CVE-2015-7661", "CVE-2015-7662", "CVE-2015-7663", "CVE-2015-8042", "CVE-2015-8043", "CVE-2015-8044", "CVE-2015-8046"], "description": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player. These\nvulnerabilities, detailed in the Adobe Security Bulletins APSB15-25,\nAPSB15-27, and APSB15-28 listed in the References section, could allow an\nattacker to create a specially crafted SWF file that would cause\nflash-plugin to crash, execute arbitrary code, or disclose sensitive\ninformation when the victim loaded a page containing the malicious SWF\ncontent. (CVE-2015-5569, CVE-2015-7625, CVE-2015-7626, CVE-2015-7627,\nCVE-2015-7628, CVE-2015-7629, CVE-2015-7630, CVE-2015-7631, CVE-2015-7632,\nCVE-2015-7633, CVE-2015-7634, CVE-2015-7635, CVE-2015-7636, CVE-2015-7637,\nCVE-2015-7638, CVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642,\nCVE-2015-7643, CVE-2015-7644, CVE-2015-7645, CVE-2015-7647, CVE-2015-7648,\nCVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655,\nCVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7659, CVE-2015-7660,\nCVE-2015-7661, CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\nCVE-2015-8044, CVE-2015-8046)\n\nAll users of Adobe Flash Player should install this updated package, which\nupgrades Flash Player to version 11.2.202.548.\n", "modified": "2017-07-27T07:18:58", "published": "2015-11-11T05:00:00", "id": "RHSA-2015:2024", "href": "https://access.redhat.com/errata/RHSA-2015:2024", "type": "redhat", "title": "(RHSA-2015:2024) Critical: flash-plugin security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T14:35:10", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7653", "CVE-2015-7654", "CVE-2015-7655", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7658", "CVE-2015-7659", "CVE-2015-7660", "CVE-2015-7661", "CVE-2015-7662", "CVE-2015-7663", "CVE-2015-8042", "CVE-2015-8043", "CVE-2015-8044", "CVE-2015-8046"], "description": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player. These\nvulnerabilities, detailed in the Adobe Security Bulletin APSB15-28 listed\nin the References section, could allow an attacker to create a specially\ncrafted SWF file that would cause flash-plugin to crash, execute arbitrary\ncode, or disclose sensitive information when the victim loaded a page\ncontaining the malicious SWF content. (CVE-2015-7651, CVE-2015-7652,\nCVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\nCVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\nCVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046)\n\nAll users of Adobe Flash Player should install this updated package, which\nupgrades Flash Player to version 11.2.202.548.\n", "modified": "2018-06-07T09:04:21", "published": "2015-11-11T05:00:00", "id": "RHSA-2015:2023", "href": "https://access.redhat.com/errata/RHSA-2015:2023", "type": "redhat", "title": "(RHSA-2015:2023) Critical: flash-plugin security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T14:34:47", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5569", "CVE-2015-7625", "CVE-2015-7626", "CVE-2015-7627", "CVE-2015-7628", "CVE-2015-7629", "CVE-2015-7630", "CVE-2015-7631", "CVE-2015-7632", "CVE-2015-7633", "CVE-2015-7634", "CVE-2015-7643", "CVE-2015-7644"], "description": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player. These\nvulnerabilities, detailed in the Adobe Security Bulletin APSB15-25 listed\nin the References section, could allow an attacker to create a specially\ncrafted SWF file that would cause flash-plugin to crash, execute arbitrary\ncode, or disclose sensitive information when the victim loaded a page\ncontaining the malicious SWF content. (CVE-2015-5569, CVE-2015-7625,\nCVE-2015-7626, CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630,\nCVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634, CVE-2015-7643,\nCVE-2015-7644)\n\nAll users of Adobe Flash Player should install this updated package, which\nupgrades Flash Player to version 11.2.202.535.\n", "modified": "2018-06-07T09:04:22", "published": "2015-10-15T04:00:00", "id": "RHSA-2015:1893", "href": "https://access.redhat.com/errata/RHSA-2015:1893", "type": "redhat", "title": "(RHSA-2015:1893) Critical: flash-plugin security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:29", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7647", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7626", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-7648", "CVE-2015-7646", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7645", "CVE-2015-7632", "CVE-2015-8044", "CVE-2015-7631", "CVE-2015-7644", "CVE-2015-7659", "CVE-2015-7662"], "edition": 1, "description": "### Background\n\nThe Adobe Flash Player is a renderer for the SWF file format, which is commonly used to provide interactive websites. \n\n### Description\n\nMultiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Adobe Flash Player users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-plugins/adobe-flash-11.2.202.548\"", "modified": "2015-11-17T00:00:00", "published": "2015-11-17T00:00:00", "id": "GLSA-201511-02", "href": "https://security.gentoo.org/glsa/201511-02", "type": "gentoo", "title": "Adobe Flash Player: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2019-05-29T18:36:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7647", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7626", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-7648", "CVE-2015-7646", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7645", "CVE-2015-7632", "CVE-2015-8044", "CVE-2015-7631", "CVE-2015-7644", "CVE-2015-7659", "CVE-2015-7662"], "description": "Gentoo Linux Local Security Checks GLSA 201511-02", "modified": "2018-10-26T00:00:00", "published": "2015-11-17T00:00:00", "id": "OPENVAS:1361412562310121422", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121422", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201511-02", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201511-02.nasl 12128 2018-10-26 13:35:25Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121422\");\n script_version(\"$Revision: 12128 $\");\n script_tag(name:\"creation_date\", value:\"2015-11-17 17:06:23 +0200 (Tue, 17 Nov 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-26 15:35:25 +0200 (Fri, 26 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201511-02\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in Adobe Flash Player. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201511-02\");\n script_cve_id(\"CVE-2015-5569\", \"CVE-2015-7625\", \"CVE-2015-7626\", \"CVE-2015-7627\", \"CVE-2015-7628\", \"CVE-2015-7629\", \"CVE-2015-7630\", \"CVE-2015-7631\", \"CVE-2015-7632\", \"CVE-2015-7633\", \"CVE-2015-7634\", \"CVE-2015-7643\", \"CVE-2015-7644\", \"CVE-2015-7645\", \"CVE-2015-7646\", \"CVE-2015-7647\", \"CVE-2015-7648\", \"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks GLSA 201511-02\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"www-plugins/adobe-flash\", unaffected: make_list(\"ge 11.2.202.548\"), vulnerable: make_list(\"lt 11.2.202.548\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:37:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7635", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7640", "CVE-2015-7637", "CVE-2015-7638", "CVE-2015-7636", "CVE-2015-7626", "CVE-2015-7639", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7642", "CVE-2015-7632", "CVE-2015-7641", "CVE-2015-7631", "CVE-2015-7644"], "description": "This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2015-10-16T00:00:00", "id": "OPENVAS:1361412562310806096", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806096", "type": "openvas", "title": "Adobe Air Multiple Vulnerabilities -01 Oct15 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_adobe_air_mult_vuln01_oct15_win.nasl 11872 2018-10-12 11:22:41Z cfischer $\n#\n# Adobe Air Multiple Vulnerabilities -01 Oct15 (Windows)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:adobe_air\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806096\");\n script_version(\"$Revision: 11872 $\");\n script_cve_id(\"CVE-2015-5569\", \"CVE-2015-7625\", \"CVE-2015-7626\", \"CVE-2015-7627\",\n \"CVE-2015-7628\", \"CVE-2015-7629\", \"CVE-2015-7630\", \"CVE-2015-7631\",\n \"CVE-2015-7632\", \"CVE-2015-7633\", \"CVE-2015-7634\", \"CVE-2015-7635\",\n \"CVE-2015-7636\", \"CVE-2015-7637\", \"CVE-2015-7638\", \"CVE-2015-7639\",\n \"CVE-2015-7640\", \"CVE-2015-7641\", \"CVE-2015-7642\", \"CVE-2015-7643\",\n \"CVE-2015-7644\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 13:22:41 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-16 15:34:40 +0530 (Fri, 16 Oct 2015)\");\n script_name(\"Adobe Air Multiple Vulnerabilities -01 Oct15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Improper implementation of the Flash broker API.\n\n - Multiple memory corruption errors.\n\n - An use-after-free error.\n\n - An error in same origin policy.\n\n - A buffer overflow error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to obtain sensitive information, execute arbitrary code or cause a denial of\n service and have other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Adobe Air versions before\n 19.0.0.213 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Air version\n 19.0.0.213 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-25.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Air/Win/Installed\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/air\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!airVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:airVer, test_version:\"19.0.0.213\"))\n{\n report = 'Installed version: ' + airVer + '\\n' +\n 'Fixed version: ' + \"19.0.0.213\" + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:12:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7635", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7640", "CVE-2015-7637", "CVE-2015-7638", "CVE-2015-7636", "CVE-2015-7626", "CVE-2015-7639", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7642", "CVE-2015-7632", "CVE-2015-7641", "CVE-2015-7631", "CVE-2015-7644"], "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-10-16T00:00:00", "id": "OPENVAS:1361412562310806095", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806095", "type": "openvas", "title": "Adobe Flash Player Multiple Vulnerabilities - 01 Oct15 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities - 01 Oct15 (Linux)\n#\n# Authors:\n# Rinu <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806095\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-5569\", \"CVE-2015-7625\", \"CVE-2015-7626\", \"CVE-2015-7627\",\n \"CVE-2015-7628\", \"CVE-2015-7629\", \"CVE-2015-7630\", \"CVE-2015-7631\",\n \"CVE-2015-7632\", \"CVE-2015-7633\", \"CVE-2015-7634\", \"CVE-2015-7635\",\n \"CVE-2015-7636\", \"CVE-2015-7637\", \"CVE-2015-7638\", \"CVE-2015-7639\",\n \"CVE-2015-7640\", \"CVE-2015-7641\", \"CVE-2015-7642\", \"CVE-2015-7643\",\n \"CVE-2015-7644\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-10-16 13:35:25 +0530 (Fri, 16 Oct 2015)\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities - 01 Oct15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Improper implementation of the Flash broker API.\n\n - Multiple memory corruption errors.\n\n - An use-after-free error.\n\n - An error in same origin policy.\n\n - A buffer overflow error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to obtain sensitive information, execute arbitrary code or cause a denial of\n service and have other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player before version\n 11.2.202.535 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 11.2.202.535 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-25.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_lin.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:playerVer, test_version:\"11.2.202.535\"))\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version: 11.2.202.535 \\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:13:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7635", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7640", "CVE-2015-7637", "CVE-2015-7638", "CVE-2015-7636", "CVE-2015-7626", "CVE-2015-7639", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7642", "CVE-2015-7632", "CVE-2015-7641", "CVE-2015-7631", "CVE-2015-7644"], "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-10-16T00:00:00", "id": "OPENVAS:1361412562310806093", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806093", "type": "openvas", "title": "Adobe Flash Player Multiple Vulnerabilities - 01 Oct15 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities - 01 Oct15 (Windows)\n#\n# Authors:\n# Rinu <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806093\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-5569\", \"CVE-2015-7625\", \"CVE-2015-7626\", \"CVE-2015-7627\",\n \"CVE-2015-7628\", \"CVE-2015-7629\", \"CVE-2015-7630\", \"CVE-2015-7631\",\n \"CVE-2015-7632\", \"CVE-2015-7633\", \"CVE-2015-7634\", \"CVE-2015-7635\",\n \"CVE-2015-7636\", \"CVE-2015-7637\", \"CVE-2015-7638\", \"CVE-2015-7639\",\n \"CVE-2015-7640\", \"CVE-2015-7641\", \"CVE-2015-7642\", \"CVE-2015-7643\",\n \"CVE-2015-7644\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-10-16 17:18:06 +0530 (Fri, 16 Oct 2015)\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities - 01 Oct15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Improper implementation of the Flash broker API.\n\n - Multiple memory corruption errors.\n\n - An use-after-free error.\n\n - An error in same origin policy.\n\n - A buffer overflow error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to obtain sensitive information, execute arbitrary code or cause a denial of\n service and have other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player before version\n 18.0.0.252 and 19.x through 19.0.0.185 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 18.0.0.252 or 19.0.0.207 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-25.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Win/Installed\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:playerVer, test_version:\"18.0.0.252\"))\n{\n fix = \"18.0.0.252\";\n VULN = TRUE;\n}\n\nif(version_in_range(version:playerVer, test_version:\"19.0\", test_version2:\"19.0.0.185\"))\n{\n fix = \"19.0.0.207\";\n VULN = TRUE;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version: ' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:35:58", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7635", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7640", "CVE-2015-7637", "CVE-2015-7638", "CVE-2015-7636", "CVE-2015-7626", "CVE-2015-7639", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7642", "CVE-2015-7632", "CVE-2015-7641", "CVE-2015-7631", "CVE-2015-7644"], "description": "This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2015-10-16T00:00:00", "id": "OPENVAS:1361412562310806097", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806097", "type": "openvas", "title": "Adobe Air Multiple Vulnerabilities -01 Oct15 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_adobe_air_mult_vuln01_oct15_macosx.nasl 11872 2018-10-12 11:22:41Z cfischer $\n#\n# Adobe Air Multiple Vulnerabilities -01 Oct15 (Mac OS X)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:adobe_air\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806097\");\n script_version(\"$Revision: 11872 $\");\n script_cve_id(\"CVE-2015-5569\", \"CVE-2015-7625\", \"CVE-2015-7626\", \"CVE-2015-7627\",\n \"CVE-2015-7628\", \"CVE-2015-7629\", \"CVE-2015-7630\", \"CVE-2015-7631\",\n \"CVE-2015-7632\", \"CVE-2015-7633\", \"CVE-2015-7634\", \"CVE-2015-7635\",\n \"CVE-2015-7636\", \"CVE-2015-7637\", \"CVE-2015-7638\", \"CVE-2015-7639\",\n \"CVE-2015-7640\", \"CVE-2015-7641\", \"CVE-2015-7642\", \"CVE-2015-7643\",\n \"CVE-2015-7644\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 13:22:41 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-10-16 14:34:40 +0530 (Fri, 16 Oct 2015)\");\n script_name(\"Adobe Air Multiple Vulnerabilities -01 Oct15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - Improper implementation of the Flash broker API.\n\n - Multiple memory corruption errors.\n\n - An use-after-free error.\n\n - An error in same origin policy.\n\n - A buffer overflow error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to obtain sensitive information, execute arbitrary code or cause a denial of\n service and have other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Adobe Air versions before\n 19.0.0.213 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Air version\n 19.0.0.213 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-25.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Air/MacOSX/Version\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/air\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!airVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:airVer, test_version:\"19.0.0.213\"))\n{\n report = 'Installed version: ' + airVer + '\\n' +\n 'Fixed version: ' + \"19.0.0.213\" + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:13:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7635", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7640", "CVE-2015-7637", "CVE-2015-7638", "CVE-2015-7636", "CVE-2015-7626", "CVE-2015-7639", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7642", "CVE-2015-7632", "CVE-2015-7641", "CVE-2015-7631", "CVE-2015-7644"], "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-10-16T00:00:00", "id": "OPENVAS:1361412562310806094", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806094", "type": "openvas", "title": "Adobe Flash Player Multiple Vulnerabilities - 01 Oct15 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities - 01 Oct15 (Mac OS X)\n#\n# Authors:\n# Rinu <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806094\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-5569\", \"CVE-2015-7625\", \"CVE-2015-7626\", \"CVE-2015-7627\",\n \"CVE-2015-7628\", \"CVE-2015-7629\", \"CVE-2015-7630\", \"CVE-2015-7631\",\n \"CVE-2015-7632\", \"CVE-2015-7633\", \"CVE-2015-7634\", \"CVE-2015-7635\",\n \"CVE-2015-7636\", \"CVE-2015-7637\", \"CVE-2015-7638\", \"CVE-2015-7639\",\n \"CVE-2015-7640\", \"CVE-2015-7641\", \"CVE-2015-7642\", \"CVE-2015-7643\",\n \"CVE-2015-7644\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-10-16 13:33:10 +0530 (Fri, 16 Oct 2015)\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities - 01 Oct15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - Improper implementation of the Flash broker API.\n\n - Multiple memory corruption errors.\n\n - An use-after-free error.\n\n - An error in same origin policy.\n\n - A buffer overflow error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to obtain sensitive information, execute arbitrary code or cause a denial of\n service and have other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player before version\n 18.0.0.252 and 19.x through 19.0.0.185 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 18.0.0.252 or 19.0.0.207 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-25.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Flash/Player/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:playerVer, test_version:\"18.0.0.252\"))\n{\n fix = \"18.0.0.252\";\n VULN = TRUE;\n}\n\nif(version_in_range(version:playerVer, test_version:\"19.0\", test_version2:\"19.0.0.185\"))\n{\n fix = \"19.0.0.207\";\n VULN = TRUE;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version: ' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:13:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-11-13T00:00:00", "id": "OPENVAS:1361412562310806617", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806617", "type": "openvas", "title": "Adobe Flash Player Multiple Vulnerabilities Nov15 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities Nov15 (Mac OS X)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806617\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\",\n \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\",\n \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\",\n \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\",\n \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-11-13 17:45:30 +0530 (Fri, 13 Nov 2015)\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities Nov15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - A type confusion error.\n\n - Multiple use-after-free errors.\n\n - Another unspecified error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security restrictions and execute arbitrary code on the affected\n system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 18.x before\n 18.0.0.261 and 19.x before 19.0.0.245 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 18.0.0.261 or 19.0.0.245 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Flash/Player/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:playerVer, test_version:\"19.0\", test_version2:\"19.0.0.244\"))\n{\n fix = \"19.0.0.245\";\n VULN = TRUE;\n}\n\nelse if(version_in_range(version:playerVer, test_version:\"18.0\", test_version2:\"18.0.0.260\"))\n{\n fix = \"18.0.0.261\";\n VULN = TRUE;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version:' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:58", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "description": "This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2015-11-13T00:00:00", "id": "OPENVAS:1361412562310806619", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806619", "type": "openvas", "title": "Adobe Air Multiple Vulnerabilities Nov15 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_adobe_air_mult_vuln_nov15_win.nasl 11872 2018-10-12 11:22:41Z cfischer $\n#\n# Adobe Air Multiple Vulnerabilities Nov15 (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:adobe_air\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806619\");\n script_version(\"$Revision: 11872 $\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\",\n \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\",\n \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\",\n \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\",\n \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 13:22:41 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-11-13 18:40:09 +0530 (Fri, 13 Nov 2015)\");\n script_name(\"Adobe Air Multiple Vulnerabilities Nov15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - A type confusion error.\n\n - Multiple use-after-free errors.\n\n - Another unspecified error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security restrictions and execute arbitrary code on the affected\n system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Air versions before\n 19.0.0.241 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Air version\n 19.0.0.241 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Air/Win/Installed\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/air\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!airVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:airVer, test_version:\"19.0.0.241\"))\n{\n report = 'Installed version: ' + airVer + '\\n' +\n 'Fixed version: ' + \"19.0.0.241\" + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:13:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-11-13T00:00:00", "id": "OPENVAS:1361412562310806616", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806616", "type": "openvas", "title": "Adobe Flash Player Multiple Vulnerabilities Nov15 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities Nov15 (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806616\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\",\n \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\",\n \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\",\n \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\",\n \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-11-13 17:36:09 +0530 (Fri, 13 Nov 2015)\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities Nov15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - A type confusion error.\n\n - Multiple use-after-free errors.\n\n - Another unspecified error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security restrictions and execute arbitrary code on the affected\n system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 18.x before\n 18.0.0.261 and 19.x before 19.0.0.245 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 18.0.0.261 or 19.0.0.245 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Win/Installed\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:playerVer, test_version:\"19.0\", test_version2:\"19.0.0.244\"))\n{\n fix = \"19.0.0.245\";\n VULN = TRUE;\n}\n\nelse if(version_in_range(version:playerVer, test_version:\"18.0\", test_version2:\"18.0.0.260\"))\n{\n fix = \"18.0.0.261\";\n VULN = TRUE;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version:' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:13:41", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-11-13T00:00:00", "id": "OPENVAS:1361412562310806618", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806618", "type": "openvas", "title": "Adobe Flash Player Multiple Vulnerabilities Nov15 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities Nov15 (Linux)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806618\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\",\n \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\",\n \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\",\n \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\",\n \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-11-13 18:47:26 +0530 (Fri, 13 Nov 2015)\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities Nov15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - A type confusion error.\n\n - Multiple use-after-free errors.\n\n - Another unspecified error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security restrictions and execute arbitrary code on the affected\n system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player before version 11.2.202.548\n on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 11.2.202.548 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_lin.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:playerVer, test_version:\"11.0\", test_version2:\"11.2.202.547\"))\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version: 11.2.202.548 \\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-12T11:04:47", "description": "The remote host is affected by the vulnerability described in GLSA-201511-02\n(Adobe Flash Player: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Adobe Flash Player.\n Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, obtain\n sensitive information, or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 23, "published": "2015-11-18T00:00:00", "title": "GLSA-201511-02 : Adobe Flash Player: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7647", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7626", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-7648", "CVE-2015-7646", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7645", "CVE-2015-7632", "CVE-2015-8044", "CVE-2015-7631", "CVE-2015-7644", "CVE-2015-7659", "CVE-2015-7662"], "modified": "2015-11-18T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:adobe-flash"], "id": "GENTOO_GLSA-201511-02.NASL", "href": "https://www.tenable.com/plugins/nessus/86908", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201511-02.\n#\n# The advisory text is Copyright (C) 2001-2015 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86908);\n script_version(\"2.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-5569\", \"CVE-2015-7625\", \"CVE-2015-7626\", \"CVE-2015-7627\", \"CVE-2015-7628\", \"CVE-2015-7629\", \"CVE-2015-7630\", \"CVE-2015-7631\", \"CVE-2015-7632\", \"CVE-2015-7633\", \"CVE-2015-7634\", \"CVE-2015-7643\", \"CVE-2015-7644\", \"CVE-2015-7645\", \"CVE-2015-7646\", \"CVE-2015-7647\", \"CVE-2015-7648\", \"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n script_xref(name:\"GLSA\", value:\"201511-02\");\n\n script_name(english:\"GLSA-201511-02 : Adobe Flash Player: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201511-02\n(Adobe Flash Player: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in Adobe Flash Player.\n Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, obtain\n sensitive information, or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201511-02\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Adobe Flash Player users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-plugins/adobe-flash-11.2.202.548'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:adobe-flash\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-plugins/adobe-flash\", unaffected:make_list(\"ge 11.2.202.548\"), vulnerable:make_list(\"lt 11.2.202.548\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Adobe Flash Player\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T05:05:50", "description": "An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletin\nAPSB15-25 listed in the References section, could allow an attacker to\ncreate a specially crafted SWF file that would cause flash-plugin to\ncrash, execute arbitrary code, or disclose sensitive information when\nthe victim loaded a page containing the malicious SWF content.\n(CVE-2015-5569, CVE-2015-7625, CVE-2015-7626, CVE-2015-7627,\nCVE-2015-7628, CVE-2015-7629, CVE-2015-7630, CVE-2015-7631,\nCVE-2015-7632, CVE-2015-7633, CVE-2015-7634, CVE-2015-7643,\nCVE-2015-7644)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.535.", "edition": 26, "published": "2015-10-15T00:00:00", "title": "RHEL 6 : flash-plugin (RHSA-2015:1893)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7635", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7640", "CVE-2015-7637", "CVE-2015-7638", "CVE-2015-7636", "CVE-2015-7626", "CVE-2015-7639", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7642", "CVE-2015-7632", "CVE-2015-7641", "CVE-2015-7631", "CVE-2015-7644"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:6.7", "p-cpe:/a:redhat:enterprise_linux:flash-plugin", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2015-1893.NASL", "href": "https://www.tenable.com/plugins/nessus/86396", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1893. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86396);\n script_version(\"2.16\");\n script_cvs_date(\"Date: 2019/10/24 15:35:40\");\n\n script_cve_id(\"CVE-2015-5569\", \"CVE-2015-7625\", \"CVE-2015-7626\", \"CVE-2015-7627\", \"CVE-2015-7628\", \"CVE-2015-7629\", \"CVE-2015-7630\", \"CVE-2015-7631\", \"CVE-2015-7632\", \"CVE-2015-7633\", \"CVE-2015-7634\", \"CVE-2015-7635\", \"CVE-2015-7636\", \"CVE-2015-7637\", \"CVE-2015-7638\", \"CVE-2015-7639\", \"CVE-2015-7640\", \"CVE-2015-7641\", \"CVE-2015-7642\", \"CVE-2015-7643\", \"CVE-2015-7644\");\n script_xref(name:\"RHSA\", value:\"2015:1893\");\n\n script_name(english:\"RHEL 6 : flash-plugin (RHSA-2015:1893)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletin\nAPSB15-25 listed in the References section, could allow an attacker to\ncreate a specially crafted SWF file that would cause flash-plugin to\ncrash, execute arbitrary code, or disclose sensitive information when\nthe victim loaded a page containing the malicious SWF content.\n(CVE-2015-5569, CVE-2015-7625, CVE-2015-7626, CVE-2015-7627,\nCVE-2015-7628, CVE-2015-7629, CVE-2015-7630, CVE-2015-7631,\nCVE-2015-7632, CVE-2015-7633, CVE-2015-7634, CVE-2015-7643,\nCVE-2015-7644)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.535.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-25.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:1893\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7643\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7644\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7633\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7634\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7626\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7627\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7631\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7630\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-5569\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7632\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7628\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7629\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-plugin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:flash-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/10/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/10/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:1893\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", reference:\"flash-plugin-11.2.202.535-1.el6_7\")) flag++;\n\n\n if (flag)\n {\n flash_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check only applies to RedHat released\\n' +\n 'versions of the flash-plugin package. This check does not apply to\\n' +\n 'Adobe released versions of the flash-plugin package, which are\\n' +\n 'versioned similarly and cause collisions in detection.\\n\\n' +\n\n 'If you are certain you are running the Adobe released package of\\n' +\n 'flash-plugin and are running a version of it equal or higher to the\\n' +\n 'RedHat version listed above then you can consider this a false\\n' +\n 'positive.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat() + flash_plugin_caveat\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-plugin\");\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-05T11:12:28", "description": "The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046", "edition": 16, "published": "2015-11-16T00:00:00", "title": "openSUSE Security Update : flash-player (openSUSE-2015-738)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "modified": "2015-11-16T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:flash-player-kde4", "p-cpe:/a:novell:opensuse:flash-player-gnome", "cpe:/o:novell:opensuse:13.2", "p-cpe:/a:novell:opensuse:flash-player", "cpe:/o:novell:opensuse:13.1"], "id": "OPENSUSE-2015-738.NASL", "href": "https://www.tenable.com/plugins/nessus/86880", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-738.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86880);\n script_version(\"2.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/04\");\n\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n\n script_name(english:\"openSUSE Security Update : flash-player (openSUSE-2015-738)\");\n script_summary(english:\"Check for the openSUSE-2015-738 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=954512\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-player packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:flash-player\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:flash-player-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:flash-player-kde4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2020 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"flash-player-11.2.202.548-144.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"flash-player-gnome-11.2.202.548-144.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"flash-player-kde4-11.2.202.548-144.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"flash-player-11.2.202.548-2.79.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"flash-player-gnome-11.2.202.548-2.79.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"flash-player-kde4-11.2.202.548-2.79.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-player / flash-player-gnome / flash-player-kde4\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T01:14:10", "description": "The version of Adobe AIR installed on the remote Windows host is equal\nor prior to version 19.0.0.241. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)", "edition": 24, "published": "2015-11-11T00:00:00", "title": "Adobe AIR <= 19.0.0.213 Multiple Vulnerabilities (APSB15-28)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:air"], "id": "ADOBE_AIR_APSB15-28.NASL", "href": "https://www.tenable.com/plugins/nessus/86850", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86850);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-7651\",\n \"CVE-2015-7652\",\n \"CVE-2015-7653\",\n \"CVE-2015-7654\",\n \"CVE-2015-7655\",\n \"CVE-2015-7656\",\n \"CVE-2015-7657\",\n \"CVE-2015-7658\",\n \"CVE-2015-7659\",\n \"CVE-2015-7660\",\n \"CVE-2015-7661\",\n \"CVE-2015-7662\",\n \"CVE-2015-7663\",\n \"CVE-2015-8042\",\n \"CVE-2015-8043\",\n \"CVE-2015-8044\",\n \"CVE-2015-8046\"\n );\n\n script_name(english:\"Adobe AIR <= 19.0.0.213 Multiple Vulnerabilities (APSB15-28)\");\n script_summary(english:\"Checks the version of AIR.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe AIR installed on the remote Windows host is equal\nor prior to version 19.0.0.241. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe AIR version 19.0.0.241 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8046\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:air\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_air_installed.nasl\");\n script_require_keys(\"SMB/Adobe_AIR/Version\", \"SMB/Adobe_AIR/Path\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"SMB/Adobe_AIR/Version\");\npath = get_kb_item_or_exit(\"SMB/Adobe_AIR/Path\");\n\nversion_ui = get_kb_item(\"SMB/Adobe_AIR/Version_UI\");\nif (isnull(version_ui)) version_report = version;\nelse version_report = version_ui + ' (' + version + ')';\n\ncutoff_version = '19.0.0.213';\nfix = '19.0.0.241';\nfix_ui = '19.0';\n\nif (ver_compare(ver:version, fix:cutoff_version) <= 0)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version_report +\n '\\n Fixed version : ' + fix_ui + \" (\" + fix + ')' +\n '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Adobe AIR\", version_report, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T05:05:53", "description": "An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletin\nAPSB15-28 listed in the References section, could allow an attacker to\ncreate a specially crafted SWF file that would cause flash-plugin to\ncrash, execute arbitrary code, or disclose sensitive information when\nthe victim loaded a page containing the malicious SWF content.\n(CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\nCVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658,\nCVE-2015-7659, CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\nCVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044,\nCVE-2015-8046)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.548.", "edition": 26, "published": "2015-11-12T00:00:00", "title": "RHEL 6 : flash-plugin (RHSA-2015:2023)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:6.7", "p-cpe:/a:redhat:enterprise_linux:flash-plugin", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2015-2023.NASL", "href": "https://www.tenable.com/plugins/nessus/86861", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:2023. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86861);\n script_version(\"2.15\");\n script_cvs_date(\"Date: 2019/10/24 15:35:40\");\n\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n script_xref(name:\"RHSA\", value:\"2015:2023\");\n\n script_name(english:\"RHEL 6 : flash-plugin (RHSA-2015:2023)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletin\nAPSB15-28 listed in the References section, could allow an attacker to\ncreate a specially crafted SWF file that would cause flash-plugin to\ncrash, execute arbitrary code, or disclose sensitive information when\nthe victim loaded a page containing the malicious SWF content.\n(CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\nCVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658,\nCVE-2015-7659, CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\nCVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044,\nCVE-2015-8046)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.548.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:2023\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7657\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7656\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7653\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7651\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8046\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7662\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7663\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7661\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8043\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8042\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-plugin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:flash-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:2023\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", reference:\"flash-plugin-11.2.202.548-1.el6_7\")) flag++;\n\n\n if (flag)\n {\n flash_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check only applies to RedHat released\\n' +\n 'versions of the flash-plugin package. This check does not apply to\\n' +\n 'Adobe released versions of the flash-plugin package, which are\\n' +\n 'versioned similarly and cause collisions in detection.\\n\\n' +\n\n 'If you are certain you are running the Adobe released package of\\n' +\n 'flash-plugin and are running a version of it equal or higher to the\\n' +\n 'RedHat version listed above then you can consider this a false\\n' +\n 'positive.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat() + flash_plugin_caveat\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-plugin\");\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:29:52", "description": "The version of Adobe Flash Player installed on the remote Mac OS X\nhost is equal or prior to version 19.0.0.226. It is, therefore,\naffected by multiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)", "edition": 24, "published": "2015-11-11T00:00:00", "title": "Adobe Flash Player for Mac <= 19.0.0.226 Multiple Vulnerabilities (APSB15-28)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:flash_player"], "id": "MACOSX_FLASH_PLAYER_APSB15-28.NASL", "href": "https://www.tenable.com/plugins/nessus/86854", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86854);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-7651\",\n \"CVE-2015-7652\",\n \"CVE-2015-7653\",\n \"CVE-2015-7654\",\n \"CVE-2015-7655\",\n \"CVE-2015-7656\",\n \"CVE-2015-7657\",\n \"CVE-2015-7658\",\n \"CVE-2015-7659\",\n \"CVE-2015-7660\",\n \"CVE-2015-7661\",\n \"CVE-2015-7662\",\n \"CVE-2015-7663\",\n \"CVE-2015-8042\",\n \"CVE-2015-8043\",\n \"CVE-2015-8044\",\n \"CVE-2015-8046\"\n );\n\n script_name(english:\"Adobe Flash Player for Mac <= 19.0.0.226 Multiple Vulnerabilities (APSB15-28)\");\n script_summary(english:\"Checks the version of Flash Player.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Flash Player installed on the remote Mac OS X\nhost is equal or prior to version 19.0.0.226. It is, therefore,\naffected by multiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Flash Player version 19.0.0.245 or later.\n\nAlternatively, Adobe has made version 18.0.0.261 available for those\ninstallations that cannot be upgraded to the latest version.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8046\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_flash_player_installed.nasl\");\n script_require_keys(\"MacOSX/Flash_Player/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"MacOSX/Flash_Player/Version\");\npath = get_kb_item_or_exit(\"MacOSX/Flash_Player/Path\");\n\nif (version =~ \"^19\\.\")\n{\n cutoff_version = \"19.0.0.226\";\n fix = \"19.0.0.245\";\n}\nelse\n{\n cutoff_version = \"18.0.0.255\";\n fix = \"18.0.0.261\";\n}\n\n# we're checking for versions less than or equal to the cutoff!\nif (ver_compare(ver:version, fix:cutoff_version, strict:FALSE) <= 0)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Flash Player for Mac\", version, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T03:26:56", "description": "The version of Adobe AIR installed on the remote Mac OS X host is\nequal or prior to version 19.0.0.213. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)", "edition": 24, "published": "2015-11-11T00:00:00", "title": "Adobe AIR for Mac <= 19.0.0.213 Multiple Vulnerabilities (APSB15-28)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:air"], "id": "MACOSX_ADOBE_AIR_APSB15-28.NASL", "href": "https://www.tenable.com/plugins/nessus/86853", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86853);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-7651\",\n \"CVE-2015-7652\",\n \"CVE-2015-7653\",\n \"CVE-2015-7654\",\n \"CVE-2015-7655\",\n \"CVE-2015-7656\",\n \"CVE-2015-7657\",\n \"CVE-2015-7658\",\n \"CVE-2015-7659\",\n \"CVE-2015-7660\",\n \"CVE-2015-7661\",\n \"CVE-2015-7662\",\n \"CVE-2015-7663\",\n \"CVE-2015-8042\",\n \"CVE-2015-8043\",\n \"CVE-2015-8044\",\n \"CVE-2015-8046\"\n );\n\n script_name(english:\"Adobe AIR for Mac <= 19.0.0.213 Multiple Vulnerabilities (APSB15-28)\");\n script_summary(english:\"Checks the version of AIR.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe AIR installed on the remote Mac OS X host is\nequal or prior to version 19.0.0.213. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe AIR version 19.0.0.241 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8046\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:air\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_air_installed.nasl\");\n script_require_keys(\"MacOSX/Adobe_AIR/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nkb_base = \"MacOSX/Adobe_AIR\";\nversion = get_kb_item_or_exit(kb_base+\"/Version\");\npath = get_kb_item_or_exit(kb_base+\"/Path\");\n\n# nb: we're checking for versions less than *or equal to* the cutoff!\ncutoff_version = '19.0.0.213';\nfixed_version_for_report = '19.0.0.241';\n\nif (ver_compare(ver:version, fix:cutoff_version, strict:FALSE) <= 0)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version_for_report +\n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Adobe AIR\", version, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T02:34:28", "description": "The version of Adobe Flash Player installed on the remote Windows host\nis equal or prior to version 19.0.0.226. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)", "edition": 24, "published": "2015-11-11T00:00:00", "title": "Adobe Flash Player <= 19.0.0.226 Multiple Vulnerabilities (APSB15-28)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:flash_player"], "id": "FLASH_PLAYER_APSB15-28.NASL", "href": "https://www.tenable.com/plugins/nessus/86851", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86851);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-7651\",\n \"CVE-2015-7652\",\n \"CVE-2015-7653\",\n \"CVE-2015-7654\",\n \"CVE-2015-7655\",\n \"CVE-2015-7656\",\n \"CVE-2015-7657\",\n \"CVE-2015-7658\",\n \"CVE-2015-7659\",\n \"CVE-2015-7660\",\n \"CVE-2015-7661\",\n \"CVE-2015-7662\",\n \"CVE-2015-7663\",\n \"CVE-2015-8042\",\n \"CVE-2015-8043\",\n \"CVE-2015-8044\",\n \"CVE-2015-8046\"\n );\n\n script_name(english:\"Adobe Flash Player <= 19.0.0.226 Multiple Vulnerabilities (APSB15-28)\");\n script_summary(english:\"Checks the version of Flash Player.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Flash Player installed on the remote Windows host\nis equal or prior to version 19.0.0.226. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Flash Player version 19.0.0.245 or later.\n\nAlternatively, Adobe has made version 18.0.0.261 available for those\ninstallations that cannot be upgraded to the latest version.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8046\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"flash_player_installed.nasl\");\n script_require_keys(\"SMB/Flash_Player/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/Flash_Player/installed\");\n\n# Identify vulnerable versions.\ninfo = \"\";\nvariants = make_list(\n \"Plugin\",\n \"ActiveX\",\n \"Chrome\",\n \"Chrome_Pepper\"\n);\n\n# we're checking for versions less than *or equal to* the cutoff!\nforeach variant (variants)\n{\n vers = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/Version/*\");\n files = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/File/*\");\n\n if(isnull(vers) || isnull(files))\n continue;\n\n foreach key (keys(vers))\n {\n ver = vers[key];\n if(isnull(ver))\n continue;\n\n vuln = FALSE;\n\n # Chrome Flash <= 19.0.0.226\n if(variant == \"Chrome_Pepper\" &&\n ver_compare(ver:ver,fix:\"19.0.0.226\",strict:FALSE) <= 0\n ) vuln = TRUE;\n\n # <= 18.0.0.255\n if(variant != \"Chrome_Pepper\" &&\n ver_compare(ver:ver,fix:\"18.0.0.255\",strict:FALSE) <= 0\n ) vuln = TRUE;\n\n # 19 <= 19.0.0.226\n if(variant != \"Chrome_Pepper\" &&\n ver =~ \"^(?:19|[2-9]\\d)\\.\" &&\n ver_compare(ver:ver,fix:\"19.0.0.226\",strict:FALSE) <= 0\n ) vuln = TRUE;\n\n if(vuln)\n {\n num = key - (\"SMB/Flash_Player/\"+variant+\"/Version/\");\n file = files[\"SMB/Flash_Player/\"+variant+\"/File/\"+num];\n if (variant == \"Plugin\")\n {\n info += '\\n Product : Browser Plugin (for Firefox / Netscape / Opera)';\n fix = \"19.0.0.245 / 18.0.0.261\";\n }\n else if (variant == \"ActiveX\")\n {\n info += '\\n Product : ActiveX control (for Internet Explorer)';\n fix = \"19.0.0.245 / 18.0.0.261\";\n }\n else if (\"Chrome\" >< variant)\n {\n info += '\\n Product : Browser Plugin (for Google Chrome)';\n if(variant == \"Chrome\")\n fix = \"Upgrade to a version of Google Chrome running Flash Player 19.0.0.245\";\n }\n info += '\\n Path : ' + file +\n '\\n Installed version : ' + ver;\n if (variant == \"Chrome_Pepper\")\n info += '\\n Fixed version : 19.0.0.245 (Chrome PepperFlash)';\n else if(!isnull(fix))\n info += '\\n Fixed version : '+fix;\n info += '\\n';\n }\n }\n}\n\nif (info)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0) security_hole(port:port, extra:info);\n else security_hole(port);\n}\nelse\n{\n if (thorough_tests)\n exit(0, 'No vulnerable versions of Adobe Flash Player were found.');\n else\n exit(1, 'Google Chrome\\'s built-in Flash Player may not have been detected because the \\'Perform thorough tests\\' option was not enabled.');\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T14:23:09", "description": "The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 26, "published": "2015-11-13T00:00:00", "title": "SUSE SLED11 Security Update : flash-player (SUSE-SU-2015:1960-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "modified": "2015-11-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:flash-player-kde4", "cpe:/o:novell:suse_linux:11", "p-cpe:/a:novell:suse_linux:flash-player", "p-cpe:/a:novell:suse_linux:flash-player-gnome"], "id": "SUSE_SU-2015-1960-1.NASL", "href": "https://www.tenable.com/plugins/nessus/86867", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2015:1960-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86867);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n\n script_name(english:\"SUSE SLED11 Security Update : flash-player (SUSE-SU-2015:1960-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=954512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7651/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7652/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7653/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7654/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7655/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7656/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7657/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7658/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7659/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7660/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7661/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7662/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7663/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8042/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8043/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8044/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8046/\"\n );\n # https://www.suse.com/support/update/announcement/2015/suse-su-20151960-1.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ad2bdb7b\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Desktop 11-SP4 :\n\nzypper in -t patch sledsp4-flash-player-12200=1\n\nSUSE Linux Enterprise Desktop 11-SP3 :\n\nzypper in -t patch sledsp3-flash-player-12200=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:flash-player\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:flash-player-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:flash-player-kde4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"i386|i486|i586|i686|x86_64\") audit(AUDIT_ARCH_NOT, \"i386 / i486 / i586 / i686 / x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLED11\" && (! preg(pattern:\"^(3|4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED11 SP3/4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"x86_64\", reference:\"flash-player-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"x86_64\", reference:\"flash-player-gnome-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"x86_64\", reference:\"flash-player-kde4-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"i586\", reference:\"flash-player-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"i586\", reference:\"flash-player-gnome-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"i586\", reference:\"flash-player-kde4-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"x86_64\", reference:\"flash-player-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"x86_64\", reference:\"flash-player-gnome-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"x86_64\", reference:\"flash-player-kde4-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"i586\", reference:\"flash-player-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"i586\", reference:\"flash-player-gnome-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"i586\", reference:\"flash-player-kde4-11.2.202.548-0.26.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-player\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-07T10:43:29", "description": "Adobe reports :\n\nThese updates resolve a type confusion vulnerability that could lead\nto code execution (CVE-2015-7659).\n\nThese updates resolve a security bypass vulnerability that could be\nexploited to write arbitrary data to the file system under user\npermissions (CVE-2015-7662).\n\nThese updates resolve use-after-free vulnerabilities that could lead\nto code execution (CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\nCVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\nCVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663,\nCVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046).", "edition": 22, "published": "2015-11-16T00:00:00", "title": "FreeBSD : flash -- multiple vulnerabilities (547fbd98-8b1f-11e5-b48b-bcaec565249c)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "modified": "2015-11-16T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:linux-f10-flashplugin", "p-cpe:/a:freebsd:freebsd:linux-c6-flashplugin", "p-cpe:/a:freebsd:freebsd:linux-c6_64-flashplugin"], "id": "FREEBSD_PKG_547FBD988B1F11E5B48BBCAEC565249C.NASL", "href": "https://www.tenable.com/plugins/nessus/86878", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86878);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n\n script_name(english:\"FreeBSD : flash -- multiple vulnerabilities (547fbd98-8b1f-11e5-b48b-bcaec565249c)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Adobe reports :\n\nThese updates resolve a type confusion vulnerability that could lead\nto code execution (CVE-2015-7659).\n\nThese updates resolve a security bypass vulnerability that could be\nexploited to write arbitrary data to the file system under user\npermissions (CVE-2015-7662).\n\nThese updates resolve use-after-free vulnerabilities that could lead\nto code execution (CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\nCVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\nCVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663,\nCVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\"\n );\n # https://vuxml.freebsd.org/freebsd/547fbd98-8b1f-11e5-b48b-bcaec565249c.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f68a4dc1\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-c6-flashplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-c6_64-flashplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-f10-flashplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"linux-c6-flashplugin<11.2r202.548\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-f10-flashplugin<11.2r202.548\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-c6_64-flashplugin<11.2r202.548\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2020-09-02T12:00:17", "bulletinFamily": "info", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-7635", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7640", "CVE-2015-7637", "CVE-2015-7638", "CVE-2015-7636", "CVE-2015-7626", "CVE-2015-7639", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7642", "CVE-2015-7632", "CVE-2015-7641", "CVE-2015-7631", "CVE-2015-7644"], "description": "### *Detect date*:\n10/13/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Adobe Flash Player & AIR. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions or execute arbitrary code.\n\n### *Affected products*:\nAdobe Flash Player versions earlier than 19.0.0.207 \nAdobe Flash Player Extended Support Release versions earlier than 18.0.0.252 \nAdobe Flash Player for Linux versions earlier than 11.2.202.535 \nAdobe AIR versions earlier than 19.0.0.213\n\n### *Solution*:\nUpdate to the latest version \n[Get Flash Player](<https://get.adobe.com/flashplayer/>) \n[Get AIR](<https://get.adobe.com/air/>)\n\n### *Original advisories*:\n[Adobe bulletin](<https://helpx.adobe.com/security/products/flash-player/apsb15-25.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Flash Player ActiveX](<https://threats.kaspersky.com/en/product/Adobe-Flash-Player-ActiveX/>)\n\n### *CVE-IDS*:\n[CVE-2015-7627](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7627>)10.0Critical \n[CVE-2015-7628](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7628>)5.0Critical \n[CVE-2015-7637](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7637>)10.0Critical \n[CVE-2015-7636](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7636>)10.0Critical \n[CVE-2015-7644](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7644>)10.0Critical \n[CVE-2015-7635](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7635>)10.0Critical \n[CVE-2015-5569](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5569>)10.0Critical \n[CVE-2015-7625](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7625>)10.0Critical \n[CVE-2015-7626](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7626>)10.0Critical \n[CVE-2015-7630](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7630>)10.0Critical \n[CVE-2015-7629](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7629>)9.3Critical \n[CVE-2015-7643](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7643>)9.3Critical \n[CVE-2015-7631](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7631>)9.3Critical \n[CVE-2015-7641](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7641>)10.0Critical \n[CVE-2015-7633](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7633>)10.0Critical \n[CVE-2015-7639](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7639>)10.0Critical \n[CVE-2015-7640](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7640>)10.0Critical \n[CVE-2015-7638](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7638>)10.0Critical \n[CVE-2015-7634](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7634>)10.0Critical \n[CVE-2015-7632](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7632>)9.3Critical \n[CVE-2015-7642](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7642>)10.0Critical\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).", "edition": 41, "modified": "2020-06-18T00:00:00", "published": "2015-10-13T00:00:00", "id": "KLA10679", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10679", "title": "\r KLA10679Multiple vulnerabilities in Adobe Flash Player & AIR ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T11:45:40", "bulletinFamily": "info", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "description": "### *Detect date*:\n11/10/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to bypass security restrictions or execute arbitrary code.\n\n### *Affected products*:\nAdobe Flash Player versions earlier than 19.0.0.245 \nAdobe Flash Player Extended Support Release versions earlier than 18.0.0.261 \nAdobe Flash Player for Linux versions earlier than 11.2.202.548 \nAdobe AIR versions earlier than 19.0.0.241\n\n### *Solution*:\nUpdate to the latest version \n[Get Flash Player](<https://get.adobe.com/flashplayer/>) \n[Get AIR](<https://get.adobe.com/air/>)\n\n### *Original advisories*:\n[Adobe bulletin](<https://helpx.adobe.com/security/products/flash-player/apsb15-28.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Flash Player ActiveX](<https://threats.kaspersky.com/en/product/Adobe-Flash-Player-ActiveX/>)\n\n### *CVE-IDS*:\n[CVE-2015-7656](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7656>)9.3Critical \n[CVE-2015-7655](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7655>)9.3Critical \n[CVE-2015-8043](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8043>)10.0Critical \n[CVE-2015-8044](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8044>)10.0Critical \n[CVE-2015-7663](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7663>)10.0Critical \n[CVE-2015-7652](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7652>)9.3Critical \n[CVE-2015-7661](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7661>)9.3Critical \n[CVE-2015-7662](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7662>)7.8Critical \n[CVE-2015-7659](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7659>)9.3Critical \n[CVE-2015-7651](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7651>)9.3Critical \n[CVE-2015-7654](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7654>)9.3Critical \n[CVE-2015-7653](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7653>)9.3Critical \n[CVE-2015-8046](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8046>)10.0Critical \n[CVE-2015-7657](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7657>)9.3Critical \n[CVE-2015-8042](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8042>)9.3Critical \n[CVE-2015-7660](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7660>)9.3Critical \n[CVE-2015-7658](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7658>)9.3Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 41, "modified": "2020-06-18T00:00:00", "published": "2015-11-10T00:00:00", "id": "KLA10690", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10690", "title": "\r KLA10690Multiple vulnerabilities in Adobe products ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T11:54:57", "bulletinFamily": "info", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-1302", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "description": "### *Detect date*:\n11/10/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code or obtain sensitive information.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 46.0.2490.86 (All branches)\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Chrome](<https://www.google.com/chrome/browser/desktop/index.html>)\n\n### *Original advisories*:\n[Google Chrome release blog](<http://feedproxy.google.com/~r/GoogleChromeReleases/~3/ZlDrupADnA4/stable-channel-update.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-7656](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7656>)9.3Critical \n[CVE-2015-7655](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7655>)9.3Critical \n[CVE-2015-8043](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8043>)10.0Critical \n[CVE-2015-8044](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8044>)10.0Critical \n[CVE-2015-7663](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7663>)10.0Critical \n[CVE-2015-7652](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7652>)9.3Critical \n[CVE-2015-7661](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7661>)9.3Critical \n[CVE-2015-7662](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7662>)7.8Critical \n[CVE-2015-7659](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7659>)9.3Critical \n[CVE-2015-7651](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7651>)9.3Critical \n[CVE-2015-7654](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7654>)9.3Critical \n[CVE-2015-7653](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7653>)9.3Critical \n[CVE-2015-8046](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8046>)10.0Critical \n[CVE-2015-7657](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7657>)9.3Critical \n[CVE-2015-8042](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8042>)9.3Critical \n[CVE-2015-7660](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7660>)9.3Critical \n[CVE-2015-7658](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7658>)9.3Critical \n[CVE-2015-1302](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1302>)7.5Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 41, "modified": "2020-06-18T00:00:00", "published": "2015-11-10T00:00:00", "id": "KLA10691", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10691", "title": "\r KLA10691Multiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T11:51:13", "bulletinFamily": "info", "cvelist": ["CVE-2015-7647", "CVE-2015-7648", "CVE-2015-7645"], "description": "### *Detect date*:\n10/22/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nGoogle Chrome was updated to address vulnerabilities in Flash Player. For details look at KLA10680.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 46.0.2490.80 (all branches)\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Chrome](<https://www.google.com/chrome/browser/desktop/index.html>)\n\n### *Original advisories*:\n[Google release blog entry](<http://feedproxy.google.com/~r/GoogleChromeReleases/~3/EjqdPAk-9T4/stable-channel-update_22.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-7647](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7647>)10.0Critical \n[CVE-2015-7648](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7648>)10.0Critical \n[CVE-2015-7645](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7645>)9.3Critical\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 43, "modified": "2020-06-18T00:00:00", "published": "2015-10-22T00:00:00", "id": "KLA10684", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10684", "title": "\r KLA10684Flash Player update for Google Chrome ", "type": "kaspersky", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "archlinux": [{"lastseen": "2016-09-02T18:44:46", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-8042", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "description": "- CVE-2015-7651 CVE-2015-7652 CVE-2015-7653 CVE-2015-7654\n CVE-2015-7655 CVE-2015-7656 CVE-2015-7657 CVE-2015-7658\n CVE-2015-7660 CVE-2015-7661 CVE-2015-7663 CVE-2015-8042\n CVE-2015-8043 CVE-2015-8044 CVE-2015-8046 (arbitrary code execution)\n\nIt has been discovered that multiple use-after-free vulnerabilities\ncould lead to arbitrary code execution.\n\n- CVE-2015-7659 (arbitrary code execution)\n\nA type confusion vulnerability has been discovered that could lead to\narbitrary code execution.\n\n- CVE-2015-7662 (access restriction bypass)\n\nA security bypass vulnerability has been discovered that could be\nexploited to write arbitrary data to the file system under user permissions.", "modified": "2015-11-11T00:00:00", "published": "2015-11-11T00:00:00", "id": "ASA-201511-5", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-November/000433.html", "type": "archlinux", "title": "flashplugin: multiple issues", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-02T18:44:40", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7626", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7632", "CVE-2015-7631", "CVE-2015-7644"], "description": "- CVE-2015-5569 (information leak, insufficient hardening)\n\nThese updates include a defense-in-depth feature in the Flash broker API.\n\n- CVE-2015-7625 CVE-2015-7626 CVE-2015-7627 CVE-2015-7630 CVE-2015-7633\n CVE-2015-7634 (arbitrary code execution)\n\nThese updates resolve memory corruption vulnerabilities that could lead\nto code execution.\n\n- CVE-2015-7628 (same-origin-policy bypass, information disclosure)\n\nThese updates resolve a vulnerability that could be exploited to bypass\nthe same-origin-policy and lead to information disclosure.\n\n- CVE-2015-7629 CVE-2015-7631 CVE-2015-7643 CVE-2015-7644\n (arbitrary code execution)\n\nThese updates resolve use-after-free vulnerabilities that could lead to\ncode execution.\n\n- CVE-2015-7632 (arbitrary code execution)\n\nThese updates resolve a buffer overflow vulnerability that could lead to\ncode execution.", "modified": "2015-10-14T00:00:00", "published": "2015-10-14T00:00:00", "id": "ASA-201510-7", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-October/000409.html", "type": "archlinux", "title": "flashplugin: multiple issues", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-02T18:44:48", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7647", "CVE-2015-7648", "CVE-2015-7645"], "description": "Several critical type confusion vulnerabilities (CVE-2015-7645,\nCVE-2015-7647, CVE-2015-7648) have been identified in Adobe Flash Player\n11.2.202.535 and earlier 11.x versions for Linux. Successful\nexploitation could cause a crash and potentially allow an attacker to\ntake control of the affected system.\n\nAdobe is aware of a report that an exploit for the CVE-2015-7645\nvulnerability is being used in limited, targeted attacks.", "modified": "2015-10-18T00:00:00", "published": "2015-10-18T00:00:00", "id": "ASA-201510-12", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-October/000414.html", "type": "archlinux", "title": "flashplugin: arbitrary code execution", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:59", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7660", "CVE-2015-7663", "CVE-2015-7654", "CVE-2015-7658", "CVE-2015-8043", "CVE-2015-7661", "CVE-2015-7651", "CVE-2015-7652", "CVE-2015-7656", "CVE-2015-7657", "CVE-2015-7653", "CVE-2015-7655", "CVE-2015-8046", "CVE-2015-8044", "CVE-2015-7659", "CVE-2015-7662"], "description": "\nAdobe reports:\n\nThese updates resolve a type confusion vulnerability that\n\t could lead to code execution (CVE-2015-7659).\nThese updates resolve a security bypass vulnerability that\n\t could be exploited to write arbitrary data to the file\n\t system under user permissions (CVE-2015-7662).\nThese updates resolve use-after-free vulnerabilities that\n\t could lead to code execution (CVE-2015-7651, CVE-2015-7652,\n\t CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n\t CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n\t CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044,\n\t CVE-2015-8046).\n\n", "edition": 5, "modified": "2015-11-10T00:00:00", "published": "2015-11-10T00:00:00", "id": "547FBD98-8B1F-11E5-B48B-BCAEC565249C", "href": "https://vuxml.freebsd.org/freebsd/547fbd98-8b1f-11e5-b48b-bcaec565249c.html", "title": "flash -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:33:02", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7626", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7632", "CVE-2015-7631", "CVE-2015-7644"], "description": "\nAdobe reports:\n\nThese updates resolve a vulnerability that could be exploited\n\t to bypass the same-origin-policy and lead to information\n\t disclosure (CVE-2015-7628).\nThese updates include a defense-in-depth feature in the Flash\n\t broker API (CVE-2015-5569).\nThese updates resolve use-after-free vulnerabilities that\n\t could lead to code execution (CVE-2015-7629, CVE-2015-7631,\n\t CVE-2015-7643, CVE-2015-7644).\nThese updates resolve a buffer overflow vulnerability that\n\t could lead to code execution (CVE-2015-7632).\nThese updates resolve memory corruption vulnerabilities that\n\t could lead to code execution (CVE-2015-7625, CVE-2015-7626,\n\t CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, CVE-2015-7634).\n\n", "edition": 4, "modified": "2015-10-13T00:00:00", "published": "2015-10-13T00:00:00", "id": "A63F2C06-726B-11E5-A12B-BCAEC565249C", "href": "https://vuxml.freebsd.org/freebsd/a63f2c06-726b-11e5-a12b-bcaec565249c.html", "title": "flash -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:33:01", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7647", "CVE-2015-7648", "CVE-2015-7645"], "description": "\nAdobe reports:\n\nThese updates resolve type confusion vulnerabilities that\n\t could lead to code execution (CVE-2015-7645, CVE-2015-7647,\n\t CVE-2015-7648).\n\n", "edition": 4, "modified": "2015-10-16T00:00:00", "published": "2015-10-16T00:00:00", "id": "84147B46-E876-486D-B746-339EE45A8BB9", "href": "https://vuxml.freebsd.org/freebsd/84147b46-e876-486d-b746-339ee45a8bb9.html", "title": "flash -- remote code execution", "type": "freebsd", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T12:08:03", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7626", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7632", "CVE-2015-7631", "CVE-2015-7644"], "description": "Adobe Flash Player was updated to 11.2.202.535 to fix a number of security\n issues. (boo#950169, APSB15-25)\n\n The following vulnerabilities were fixed:\n\n * CVE-2015-7628: Vulnerability that could be exploited to bypass the\n same-origin-policy and lead to information disclosure\n * CVE-2015-5569: Defense-in-depth feature in the Flash broker API\n * CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644:\n Use-after-free vulnerabilities that could lead to code execution\n * CVE-2015-7632: Buffer overflow vulnerability that could lead to code\n execution\n * CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630,\n CVE-2015-7633, CVE-2015-7634: Memory corruption vulnerabilities that\n could lead to code execution\n\n", "edition": 1, "modified": "2015-10-14T18:09:47", "published": "2015-10-14T18:09:47", "id": "OPENSUSE-SU-2015:1744-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00013.html", "type": "suse", "title": "Security update for Adobe Flash Player (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:14:44", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7626", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7632", "CVE-2015-7631", "CVE-2015-7644"], "description": "flash-player was updated to version 11.2.202.535 to fix 13 security issues\n (bsc#950169).\n\n These security issues were fixed:\n - A vulnerability that could be exploited to bypass the same-origin-policy\n and lead to information disclosure (CVE-2015-7628).\n - A defense-in-depth feature in the Flash broker API (CVE-2015-5569).\n - Use-after-free vulnerabilities that could lead to code execution\n (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644).\n - A buffer overflow vulnerability that could lead to code execution\n (CVE-2015-7632).\n - Memory corruption vulnerabilities that could lead to code execution\n (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630,\n CVE-2015-7633, CVE-2015-7634).\n\n", "edition": 1, "modified": "2015-10-14T17:11:22", "published": "2015-10-14T17:11:22", "id": "SUSE-SU-2015:1742-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00012.html", "type": "suse", "title": "Security update for flash-player (important)", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2016-09-04T12:43:04", "bulletinFamily": "unix", "cvelist": ["CVE-2015-7634", "CVE-2015-7625", "CVE-2015-5569", "CVE-2015-7627", "CVE-2015-7633", "CVE-2015-7630", "CVE-2015-7629", "CVE-2015-7626", "CVE-2015-7643", "CVE-2015-7628", "CVE-2015-7632", "CVE-2015-7631", "CVE-2015-7644"], "edition": 1, "description": "flash-player was updated to version 11.2.202.535 to fix 13 security issues\n (bsc#950169).\n\n These security issues were fixed:\n - A vulnerability that could be exploited to bypass the same-origin-policy\n and lead to information disclosure (CVE-2015-7628).\n - A defense-in-depth feature in the Flash broker API (CVE-2015-5569).\n - Use-after-free vulnerabilities that could lead to code execution\n (CVE-2015-7629, CVE-2015-7631, CVE-2015-7643, CVE-2015-7644).\n - A buffer overflow vulnerability that could lead to code execution\n (CVE-2015-7632).\n - Memory corruption vulnerabilities that could lead to code execution\n (CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630,\n CVE-2015-7633, CVE-2015-7634).\n\n", "modified": "2015-10-14T17:10:32", "published": "2015-10-14T17:10:32", "id": "SUSE-SU-2015:1740-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00011.html", "title": "Security update for flash-player (important)", "type": "suse", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "cve": [{"lastseen": "2020-12-09T20:03:07", "description": "Adobe Flash Player before 18.0.0.255 and 19.x before 19.0.0.226 on Windows and OS X and before 11.2.202.540 on Linux allows attackers to execute arbitrary code by leveraging an unspecified \"type confusion,\" a different vulnerability than CVE-2015-7648.\n<a href=\"http://cwe.mitre.org/data/definitions/843.html\">CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')</a>", "edition": 5, "cvss3": {}, "published": "2015-10-18T10:59:00", "title": "CVE-2015-7647", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7647"], "modified": "2017-09-13T01:29:00", "cpe": ["cpe:/a:adobe:flash_player:19.0.0.207", "cpe:/a:adobe:flash_player:11.2.202.535"], "id": "CVE-2015-7647", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7647", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.535:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7633.", "edition": 5, "cvss3": {}, "published": "2015-10-15T00:00:00", "title": "CVE-2015-7634", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7634"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:adobe:air_sdk_\\&_compiler:19.0.0.190", "cpe:/a:adobe:air:19.0.0.190", "cpe:/a:adobe:flash_player:19.0.0.185", "cpe:/a:adobe:flash_player:11.2.202.521", "cpe:/a:adobe:air_sdk:19.0.0.190"], "id": "CVE-2015-7634", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7634", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:11.2.202.521:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:19.0.0.190:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.", "edition": 5, "cvss3": {}, "published": "2015-10-14T23:59:00", "title": "CVE-2015-7625", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7625"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:adobe:air_sdk_\\&_compiler:19.0.0.190", "cpe:/a:adobe:air:19.0.0.190", "cpe:/a:adobe:flash_player:19.0.0.185", "cpe:/a:adobe:flash_player:11.2.202.521", "cpe:/a:adobe:air_sdk:19.0.0.190"], "id": "CVE-2015-7625", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7625", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:11.2.202.521:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:19.0.0.190:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7633, and CVE-2015-7634.", "edition": 5, "cvss3": {}, "published": "2015-10-15T00:00:00", "title": "CVE-2015-7630", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7630"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:adobe:air_sdk_\\&_compiler:19.0.0.190", "cpe:/a:adobe:air:19.0.0.190", "cpe:/a:adobe:flash_player:19.0.0.185", "cpe:/a:adobe:flash_player:11.2.202.521", "cpe:/a:adobe:air_sdk:19.0.0.190"], "id": "CVE-2015-7630", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7630", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:11.2.202.521:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:19.0.0.190:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextFormat object with a crafted tabStops property, a different vulnerability than CVE-2015-7631, CVE-2015-7643, and CVE-2015-7644.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 5, "cvss3": {}, "published": "2015-10-15T00:00:00", "title": "CVE-2015-7629", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7629"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:adobe:air_sdk_\\&_compiler:19.0.0.190", "cpe:/a:adobe:air:19.0.0.190", "cpe:/a:adobe:flash_player:19.0.0.185", "cpe:/a:adobe:flash_player:11.2.202.521", "cpe:/a:adobe:air_sdk:19.0.0.190"], "id": "CVE-2015-7629", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7629", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:11.2.202.521:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:19.0.0.190:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.", "edition": 5, "cvss3": {}, "published": "2015-10-15T00:00:00", "title": "CVE-2015-7627", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7627"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:adobe:air_sdk_\\&_compiler:19.0.0.190", "cpe:/a:adobe:air:19.0.0.190", "cpe:/a:adobe:flash_player:19.0.0.185", "cpe:/a:adobe:flash_player:11.2.202.521", "cpe:/a:adobe:air_sdk:19.0.0.190"], "id": "CVE-2015-7627", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7627", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:11.2.202.521:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:19.0.0.190:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextLine object with a crafted validity property, a different vulnerability than CVE-2015-7629, CVE-2015-7643, and CVE-2015-7644.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 5, "cvss3": {}, "published": "2015-10-15T00:00:00", "title": "CVE-2015-7631", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7631"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:adobe:air_sdk_\\&_compiler:19.0.0.190", "cpe:/a:adobe:air:19.0.0.190", "cpe:/a:adobe:flash_player:19.0.0.185", "cpe:/a:adobe:flash_player:11.2.202.521", "cpe:/a:adobe:air_sdk:19.0.0.190"], "id": "CVE-2015-7631", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7631", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:11.2.202.521:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:19.0.0.190:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7629, CVE-2015-7631, CVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638, CVE-2015-7639, CVE-2015-7640, CVE-2015-7642, CVE-2015-7643, and CVE-2015-7644.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 5, "cvss3": {}, "published": "2015-10-18T10:59:00", "title": "CVE-2015-7641", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7641"], "modified": "2018-01-05T02:30:00", "cpe": ["cpe:/a:adobe:air_sdk_\\&_compiler:19.0.0.190", "cpe:/a:adobe:air:19.0.0.190", "cpe:/a:adobe:flash_player:19.0.0.185", "cpe:/a:adobe:flash_player:11.2.202.521", "cpe:/a:adobe:air_sdk:19.0.0.190"], "id": "CVE-2015-7641", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7641", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:11.2.202.521:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:19.0.0.190:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted globalToLocal arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 5, "cvss3": {}, "published": "2015-11-11T12:59:00", "title": "CVE-2015-7653", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7653"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:adobe:flash_player:19.0.0.207", "cpe:/a:adobe:air:19.0.0.213", "cpe:/a:adobe:air_sdk_\\&_compiler:19.0.0.213", "cpe:/a:adobe:flash_player:11.2.202.540", "cpe:/a:adobe:flash_player:18.0.0.255", "cpe:/a:adobe:air:19.0.0.190", "cpe:/a:adobe:flash_player:19.0.0.226", "cpe:/a:adobe:air_sdk:19.0.0.213", "cpe:/a:adobe:flash_player:19.0.0.185"], "id": "CVE-2015-7653", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7653", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:air:19.0.0.213:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:19.0.0.213:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:19.0.0.213:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:18.0.0.255:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:11.2.202.540:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:19.0.0.190:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:03:07", "description": "Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK & Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7634.", "edition": 5, "cvss3": {}, "published": "2015-10-15T00:00:00", "title": "CVE-2015-7633", "type": "cve", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-7633"], "modified": "2017-07-01T01:29:00", "cpe": ["cpe:/a:adobe:air_sdk_\\&_compiler:19.0.0.190", "cpe:/a:adobe:air:19.0.0.190", "cpe:/a:adobe:flash_player:19.0.0.185", "cpe:/a:adobe:flash_player:11.2.202.521", "cpe:/a:adobe:air_sdk:19.0.0.190"], "id": "CVE-2015-7633", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7633", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:flash_player:11.2.202.521:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:19.0.0.190:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:19.0.0.190:*:*:*:*:*:*:*"]}]}