Flash Player for Mac <= 11.3.300.270 Code Execution (APSB12-18)

high Nessus Plugin ID 61551

Synopsis

The remote Mac OS X host has a browser plugin that is affected by a remote code execution vulnerability.

Description

According to its version, the instance of Flash Player installed on the remote Mac OS X host is 11.x equal to or earlier than 11.3.300.270. It is, therefore, potentially affected by an unspecified remote code execution vulnerability.

Also note the vendor states 10.x versions are not affected by this vulnerability and the branch was not updated.

Solution

Upgrade to Adobe Flash Player version 11.3.300.271 or later.

See Also

http://www.adobe.com/support/security/bulletins/apsb12-18.html

http://forums.adobe.com/thread/1049526

Plugin Details

Severity: High

ID: 61551

File Name: macosx_flash_player_11_3_300_271.nasl

Version: 1.15

Type: local

Agent: macosx

Published: 8/15/2012

Updated: 3/8/2022

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS Score Source: CVE-2012-1535

Vulnerability Information

CPE: cpe:/a:adobe:flash_player

Required KB Items: MacOSX/Flash_Player/Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/14/2012

Vulnerability Publication Date: 8/14/2012

CISA Known Exploited Dates: 3/24/2022

Exploitable With

CANVAS (CANVAS)

Metasploit (Adobe Flash Player 11.3 Kern Table Parsing Integer Overflow)

Reference Information

CVE: CVE-2012-1535

BID: 55009