CVE-2016-4230
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4231, and CVE-2016-4248.
Published
2016-07-13T02:00:38.013
Last Modified
2025-04-12T10:46:40.837
Status
Deferred
Source
[email protected]
Severity
CVSSv3.1: 8.8 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html
Broken Link, Third Party Advisory
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html
Broken Link, Third Party Advisory
([email protected])
-
http://packetstormsecurity.com/files/138532/Adobe-Flash-MovieClip-Transform-Use-After-Free.html
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securityfocus.com/bid/91719
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1036280
Broken Link, Third Party Advisory, VDB Entry
([email protected])
-
https://access.redhat.com/errata/RHSA-2016:1423
Third Party Advisory
([email protected])
-
https://bugs.chromium.org/p/project-zero/issues/detail?id=844&q=adobe%20flash
Exploit, Mailing List, Third Party Advisory
([email protected])
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093
Patch, Third Party Advisory
([email protected])
-
https://helpx.adobe.com/security/products/flash-player/apsb16-25.html
Patch, Vendor Advisory
([email protected])
-
https://security.gentoo.org/glsa/201607-03
Third Party Advisory
([email protected])
-
https://www.exploit-db.com/exploits/40311/
Third Party Advisory, VDB Entry
([email protected])
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00016.html
Broken Link, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00017.html
Broken Link, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://packetstormsecurity.com/files/138532/Adobe-Flash-MovieClip-Transform-Use-After-Free.html
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/91719
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1036280
Broken Link, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://access.redhat.com/errata/RHSA-2016:1423
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugs.chromium.org/p/project-zero/issues/detail?id=844&q=adobe%20flash
Exploit, Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-093
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://helpx.adobe.com/security/products/flash-player/apsb16-25.html
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.gentoo.org/glsa/201607-03
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.exploit-db.com/exploits/40311/
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)