Overview
- Description
- Adobe Flash Player before 9.0.277.0 and 10.x before 10.1.53.64; Adobe AIR before 2.0.2.12610; and Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted SWF content, related to authplay.dll and the ActionScript Virtual Machine 2 (AVM2) newfunction instruction, as exploited in the wild in June 2010.
- Source
- psirt@adobe.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Known exploits
Data from CISA
- Vulnerability name
- Adobe Flash Player Memory Corruption Vulnerability
- Exploit added on
- Jun 8, 2022
- Exploit action due
- Jun 22, 2022
- Required action
- The impacted product is end-of-life and should be disconnected if still in use.
Weaknesses
- nvd@nist.gov
- CWE-787
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A520EA13-9274-4E10-84B5-1F1FD9E5CE86", "versionEndExcluding": "2.0.2.12610" }, { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20C3001C-53F0-4C18-9CC8-89BDF8C6087D", "versionEndExcluding": "9.0.277.0" }, { "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2AA8832A-7A0F-4823-9038-B9FD37506911", "versionEndExcluding": "10.1.53.64", "versionStartIncluding": "10.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3BEBBDB0-9D07-434D-A30D-D21AE17D6CA1", "versionEndExcluding": "8.2.3", "versionStartIncluding": "8.0" }, { "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5291AD2C-5AC9-4F31-8FC7-D0F117A91099", "versionEndExcluding": "9.3.3", "versionStartIncluding": "9.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B9D5815-B269-4E63-8F37-E064B49EBF71", "versionEndIncluding": "11.2", "versionStartIncluding": "11.0" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1193A7E6-DCB4-4E79-A509-1D6948153A57" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1608E282-2E96-4447-848D-DBE915DB0EF9" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4500161F-13A0-4369-B93A-778B34E7F005" } ], "operator": "OR" } ] } ]