CVE-2012-5275
Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5276, CVE-2012-5277, and CVE-2012-5280.
Published
2012-11-07T05:41:22.113
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 10.0 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
10.0
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html
Mailing List, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html
Mailing List, Third Party Advisory
([email protected])
-
http://rhn.redhat.com/errata/RHSA-2012-1431.html
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/51186
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/51207
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/51213
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/51245
Third Party Advisory
([email protected])
-
http://www.adobe.com/support/security/bulletins/apsb12-24.html
Patch, Vendor Advisory
([email protected])
-
http://www.securitytracker.com/id?1027730
Third Party Advisory, VDB Entry
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79846
VDB Entry
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://rhn.redhat.com/errata/RHSA-2012-1431.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/51186
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/51207
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/51213
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/51245
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.adobe.com/support/security/bulletins/apsb12-24.html
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id?1027730
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79846
VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)