Flash Player < ActionScript Predefined Class Prototype Addition Remote Code Execution (APSB11-07)

High Nessus Plugin ID 53472


The remote Windows host contains a browser plug-in that allows arbitrary code execution.


The remote Windows host contains a version of Adobe Flash Player earlier than Such versions are reportedly affected by a memory corruption vulnerability.

By tricking a user on the affected system into opening a specially crafted document with Flash content, such as a SWF file embedded in a Microsoft Word document, an attacker can potentially leverage this issue to execute arbitrary code remotely on the system subject to the user's privileges.

Note that there are reports that this issue is being exploited in the wild as of April 2011.


Upgrade to Adobe Flash Player or later.

See Also



Plugin Details

Severity: High

ID: 53472

File Name: flash_player_apsb11-07.nasl

Version: $Revision: 1.15 $

Type: local

Agent: windows

Family: Windows

Published: 2011/04/18

Modified: 2017/12/15

Dependencies: 28211

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:adobe:flash_player

Required KB Items: SMB/Flash_Player/installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/04/15

Vulnerability Publication Date: 2011/04/11

Exploitable With

Core Impact

Metasploit (Adobe Flash Player SWF Memory Corruption Vulnerability)

Reference Information

CVE: CVE-2011-0611

BID: 47314

OSVDB: 71686

CERT: 230057

Secunia: 44119