CVE-2011-0609
KEV
🔴 Łataj teraz
Nieokreślona podatność w Adobe Flash Player umożliwia zdalne wykonanie kodu lub awarię aplikacji.
CVSS
7.8
EPSS
92.1%
Exploit
weaponized
Vendor
adobe
Opis źródłowy (NVD)
Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.
dos
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.8 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 92.1% |
| Opublikowano (NVD) | 2011-03-15 17:55:03 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 20:30:17 UTC |
Referencje
- http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html (psirt@adobe.com) [Broken Link]
- http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html (psirt@adobe.com) [Third Party Advisory]
- http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html (psirt@adobe.com) [Mailing List, Third Party Advisory]
- http://secunia.com/advisories/43751 (psirt@adobe.com) [Broken Link]
- http://secunia.com/advisories/43757 (psirt@adobe.com) [Broken Link]
- http://secunia.com/advisories/43772 (psirt@adobe.com) [Broken Link]
- http://secunia.com/advisories/43856 (psirt@adobe.com) [Broken Link]
- http://securityreason.com/securityalert/8152 (psirt@adobe.com) [Broken Link]
- http://www.adobe.com/support/security/advisories/apsa11-01.html (psirt@adobe.com) [Vendor Advisory]
- http://www.adobe.com/support/security/bulletins/apsb11-06.html (psirt@adobe.com) [Not Applicable]
- http://www.kb.cert.org/vuls/id/192052 (psirt@adobe.com) [Third Party Advisory, US Government Resource]
- http://www.redhat.com/support/errata/RHSA-2011-0372.html (psirt@adobe.com) [Broken Link]
- http://www.securityfocus.com/bid/46860 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id?1025210 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id?1025211 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id?1025238 (psirt@adobe.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.vupen.com/english/advisories/2011/0655 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2011/0656 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2011/0688 (psirt@adobe.com) [Broken Link]
- http://www.vupen.com/english/advisories/2011/0732 (psirt@adobe.com) [Broken Link]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66078 (psirt@adobe.com) [Third Party Advisory, VDB Entry]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14147 (psirt@adobe.com) [Broken Link]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2011-0609 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]