This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Mac OS X host has a browser plugin that is affected by a
code execution vulnerability.
According to its version, the instance of Flash Player installed on
the remote Mac OS X host is 10.x equal to or earlier than 10.3.183.18
or 11.x equal to or earlier than 18.104.22.168. It is, therefore,
reportedly affected by an object confusion vulnerability that could
allow an attacker to crash the application or potentially take control
of the target system.
By tricking a victim into visiting a specially crafted page, an
attacker may be able to utilize this vulnerability to execute
arbitrary code subject to the users' privileges.
See also :
Upgrade to Adobe Flash Player version 10.3.183.19 / 22.214.171.124 or
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true
Family: MacOS X Local Security Checks
Nessus Plugin ID: 58995 ()
Bugtraq ID: 53395
CVE ID: CVE-2012-0779
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.