Flash Player for Mac < Remote Memory Corruption (APSB11-18)

High Nessus Plugin ID 55141

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 9.2


The remote Mac OS X host has a browser plugin that is affected by a remote memory corruption vulnerability.


According to its version, the instance of Flash Player installed on the remote Mac OS X host is earlier than This version of Flash Player has a critical vulnerability. By tricking a user on the affected system into opening a specially crafted document with Flash content, an attacker could leverage the vulnerability to execute arbitrary code remotely on the system subject to the user's privileges.

This issue is reportedly being exploited in the wild in targeted attacks as of June 2011.


Upgrade to Adobe Flash for Mac version or later.

See Also


Plugin Details

Severity: High

ID: 55141

File Name: macosx_flash_player_10_3_181_26.nasl

Version: 1.12

Type: local

Agent: macosx

Published: 2011/06/15

Updated: 2018/07/14

Dependencies: 53914

Risk Information

Risk Factor: High

VPR Score: 9.2

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:adobe:flash_player

Required KB Items: MacOSX/Flash_Player/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/06/14

Vulnerability Publication Date: 2011/06/14

Exploitable With


Core Impact

Metasploit (Adobe Flash Player AVM Verification Logic Array Indexing Code Execution)

Reference Information

CVE: CVE-2011-2110

BID: 48268