Lucene search

K
openvasCopyright (C) 2011 Greenbone AGOPENVAS:1361412562310801848
HistoryFeb 15, 2011 - 12:00 a.m.

Adobe Flash Player Multiple Vulnerabilities (Feb 2011) - Linux

2011-02-1500:00:00
Copyright (C) 2011 Greenbone AG
plugins.openvas.org
12

8.9 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.131 Low

EPSS

Percentile

95.5%

Adobe Flash Player is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2011 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.801848");
  script_version("2024-02-20T14:37:13+0000");
  script_tag(name:"last_modification", value:"2024-02-20 14:37:13 +0000 (Tue, 20 Feb 2024)");
  script_tag(name:"creation_date", value:"2011-02-15 08:14:35 +0100 (Tue, 15 Feb 2011)");
  script_cve_id("CVE-2011-0558", "CVE-2011-0559", "CVE-2011-0560",
                "CVE-2011-0561", "CVE-2011-0571", "CVE-2011-0572",
                "CVE-2011-0573", "CVE-2011-0574", "CVE-2011-0575",
                "CVE-2011-0577", "CVE-2011-0578", "CVE-2011-0607",
                "CVE-2011-0608");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_name("Adobe Flash Player Multiple Vulnerabilities (Feb 2011) - Linux");
  script_xref(name:"URL", value:"http://www.vupen.com/english/advisories/2011/0336");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46186");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46188");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46189");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46190");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46191");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46192");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46193");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46194");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46195");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46196");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46197");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46282");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/46283");
  script_xref(name:"URL", value:"http://www.adobe.com/support/security/bulletins/apsb11-02.html");

  script_tag(name:"qod_type", value:"executable_version");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2011 Greenbone AG");
  script_family("General");
  script_dependencies("gb_adobe_flash_player_detect_lin.nasl");
  script_mandatory_keys("AdobeFlashPlayer/Linux/Ver");
  script_tag(name:"impact", value:"Successful exploitation will let attackers to execute arbitrary code or cause
  a denial of service.");
  script_tag(name:"affected", value:"Adobe Flash Player versions prior to 10.2.152.26 on Linux");
  script_tag(name:"insight", value:"The flaws are caused by input validation errors, memory corruptions, and
  integer overflow errors when processing malformed Flash content, which could
  be exploited by attackers to execute arbitrary code by tricking a user into
  visiting a specially crafted web page.");
  script_tag(name:"solution", value:"Upgrade to Adobe Flash Player version 10.2.152.26 or later.");
  script_tag(name:"summary", value:"Adobe Flash Player is prone to multiple vulnerabilities.");

  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("version_func.inc");

vers = get_kb_item("AdobeFlashPlayer/Linux/Ver");
if(!vers)
  exit(0);

vers = ereg_replace(pattern:",", string:vers, replace: ".");

if(version_is_less(version:vers, test_version:"10.2.152.26")){
  report = report_fixed_ver(installed_version:vers, fixed_version:"10.2.152.26");
  security_message(port: 0, data: report);
}

8.9 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.131 Low

EPSS

Percentile

95.5%