Flash Player < ActionScript Predefined Class Prototype Addition Remote Code Execution (APSB11-07)

high Nessus Plugin ID 53472


The remote Windows host contains a browser plug-in that allows arbitrary code execution.


The remote Windows host contains a version of Adobe Flash Player earlier than Such versions are reportedly affected by a memory corruption vulnerability.

By tricking a user on the affected system into opening a specially crafted document with Flash content, such as a SWF file embedded in a Microsoft Word document, an attacker can potentially leverage this issue to execute arbitrary code remotely on the system subject to the user's privileges.

Note that there are reports that this issue is being exploited in the wild as of April 2011.


Upgrade to Adobe Flash Player or later.

See Also



Plugin Details

Severity: High

ID: 53472

File Name: flash_player_apsb11-07.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 4/18/2011

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Critical

Score: 9.6


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-0611

Vulnerability Information

CPE: cpe:/a:adobe:flash_player

Required KB Items: SMB/Flash_Player/installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/15/2011

Vulnerability Publication Date: 4/11/2011

CISA Known Exploited Vulnerability Due Dates: 3/24/2022

Exploitable With

Core Impact

Metasploit (Adobe Flash Player SWF Memory Corruption Vulnerability)

Reference Information

CVE: CVE-2011-0611

BID: 47314

CERT: 230057

SECUNIA: 44119