Adobe AIR < ActionScript Predefined Class Prototype Addition Remote Code Execution (APSB11-07)

High Nessus Plugin ID 53474


The remote Windows host contains a version of Adobe AIR that allows arbitrary code execution.


The remote Windows host contains a version of Adobe AIR earlier than Such versions are reportedly affected by a memory corruption vulnerability.

By tricking a user on the affected system into opening a specially crafted document with Flash content, such as a SWF file embedded in a Microsoft Word document, an attacker can potentially leverage this issue to execute arbitrary code remotely on the system subject to the user's privileges.

Note that there are reports that this issue is being exploited in the wild as of April 2011.


Upgrade to Adobe AIR or later.

See Also

Plugin Details

Severity: High

ID: 53474

File Name: adobe_air_apsb11-07.nasl

Version: $Revision: 1.15 $

Type: local

Agent: windows

Family: Windows

Published: 2011/04/18

Modified: 2017/12/15

Dependencies: 32504

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:adobe:air

Required KB Items: SMB/Adobe_AIR/Version, SMB/Adobe_AIR/Path

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/04/15

Vulnerability Publication Date: 2011/04/11

Exploitable With

Core Impact

Metasploit (Adobe Flash Player SWF Memory Corruption Vulnerability)

Reference Information

CVE: CVE-2011-0611

BID: 47314

OSVDB: 71686

CERT: 230057

Secunia: 44119