Flash Player < 10.2.159.1 ActionScript Predefined Class Prototype Addition Remote Code Execution (APSB11-07)

high Nessus Plugin ID 53472

Synopsis

The remote Windows host contains a browser plug-in that allows arbitrary code execution.

Description

The remote Windows host contains a version of Adobe Flash Player earlier than 10.2.159.1. Such versions are reportedly affected by a memory corruption vulnerability.

By tricking a user on the affected system into opening a specially crafted document with Flash content, such as a SWF file embedded in a Microsoft Word document, an attacker can potentially leverage this issue to execute arbitrary code remotely on the system subject to the user's privileges.

Note that there are reports that this issue is being exploited in the wild as of April 2011.

Solution

Upgrade to Adobe Flash Player 10.2.159.1 or later.

See Also

http://www.nessus.org/u?9ee82b34

http://www.adobe.com/support/security/bulletins/apsb11-07.html

Plugin Details

Severity: High

ID: 53472

File Name: flash_player_apsb11-07.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 4/18/2011

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-0611

Vulnerability Information

CPE: cpe:/a:adobe:flash_player

Required KB Items: SMB/Flash_Player/installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/15/2011

Vulnerability Publication Date: 4/11/2011

CISA Known Exploited Vulnerability Due Dates: 3/24/2022

Exploitable With

Core Impact

Metasploit (Adobe Flash Player 10.2.153.1 SWF Memory Corruption Vulnerability)

Reference Information

CVE: CVE-2011-0611

BID: 47314

CERT: 230057

SECUNIA: 44119