Flash Player <= 11.3.300.270 Code Execution (APSB12-18)

high Nessus Plugin ID 61550

Synopsis

The remote Windows host has a browser plugin that is affected by a remote code execution vulnerability.

Description

According to its version, the instance of Flash Player installed on the remote Windows host is 11.x equal to or earlier than 11.3.300.270. It is, therefore, potentially affected by an unspecified remote code execution vulnerability.

Note that this vulnerability is reportedly being actively exploited in the wild.

Also note the vendor states 10.x versions are not affected by this vulnerability and the branch was not updated.

Solution

Upgrade to Adobe Flash Player version 11.3.300.271 later.

See Also

http://www.adobe.com/support/security/bulletins/apsb12-18.html

http://forums.adobe.com/thread/1049526

Plugin Details

Severity: High

ID: 61550

File Name: flash_player_apsb12-18.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 8/15/2012

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2012-1535

Vulnerability Information

CPE: cpe:/a:adobe:flash_player

Required KB Items: SMB/Flash_Player/installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/14/2012

Vulnerability Publication Date: 8/14/2012

CISA Known Exploited Dates: 3/24/2022

Exploitable With

CANVAS (CANVAS)

Metasploit (Adobe Flash Player 11.3 Kern Table Parsing Integer Overflow)

Reference Information

CVE: CVE-2012-1535

BID: 55009