Adobe AIR < 2.6.0.19140 ActionScript Predefined Class Prototype Addition Remote Code Execution (APSB11-07)

high Nessus Plugin ID 53474

Synopsis

The remote Windows host contains a version of Adobe AIR that allows arbitrary code execution.

Description

The remote Windows host contains a version of Adobe AIR earlier than 2.6.0.19140. Such versions are reportedly affected by a memory corruption vulnerability.

By tricking a user on the affected system into opening a specially crafted document with Flash content, such as a SWF file embedded in a Microsoft Word document, an attacker can potentially leverage this issue to execute arbitrary code remotely on the system subject to the user's privileges.

Note that there are reports that this issue is being exploited in the wild as of April 2011.

Solution

Upgrade to Adobe AIR 2.6.0.19140 or later.

See Also

http://www.nessus.org/u?9ee82b34

http://www.adobe.com/support/security/bulletins/apsb11-07.html

Plugin Details

Severity: High

ID: 53474

File Name: adobe_air_apsb11-07.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 4/18/2011

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-0611

Vulnerability Information

CPE: cpe:/a:adobe:air

Required KB Items: SMB/Adobe_AIR/Version, SMB/Adobe_AIR/Path

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/15/2011

Vulnerability Publication Date: 4/11/2011

CISA Known Exploited Vulnerability Due Dates: 3/24/2022

Exploitable With

Core Impact

Metasploit (Adobe Flash Player 10.2.153.1 SWF Memory Corruption Vulnerability)

Reference Information

CVE: CVE-2011-0611

BID: 47314

CERT: 230057

SECUNIA: 44119