Уязвимость обхода защиты ASLR в Adobe Flash Player и Adobe AIR через утечку адресов
Описание
Злоумышленники могут обойти механизм защиты ASLR (Address Space Layout Randomization) в Adobe Flash Player и Adobe AIR. Это происходит за счет утечки адресов, что может позволить злоумышленникам узнать расположение определенных частей памяти и использовать эту информацию для проведения других атак.
Затронутые версии ПО
- Adobe Flash Player:
- Версии до 11.7.700.260
- Версии 11.8.x и 11.9.x до 12.0.0.38 на платформах Windows и Mac OS X
- Версии до 11.2.202.335 на платформе Linux
- Adobe AIR и Adobe AIR SDK:
- Версии до 4.0.0.1390
- Adobe AIR SDK & Compiler:
- Версии до 4.0.0.1390
Тип уязвимости
Обход защиты ASLR (утечка адресов)
Ссылки
- PatchVendor Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- PatchVendor Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Одновременно
Одно из
Одно из
Одновременно
EPSS
10 Critical
CVSS2
Дефекты
Связанные уязвимости
Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK & Compiler before 4.0.0.1390 allow attackers to defeat the ASLR protection mechanism by leveraging an "address leak."
Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK & Compiler before 4.0.0.1390 allow attackers to defeat the ASLR protection mechanism by leveraging an "address leak."
Adobe Flash Player before 11.7.700.260 and 11.8.x and 11.9.x before 12.0.0.38 on Windows and Mac OS X and before 11.2.202.335 on Linux, Adobe AIR before 4.0.0.1390, Adobe AIR SDK before 4.0.0.1390, and Adobe AIR SDK & Compiler before 4.0.0.1390 allow attackers to defeat the ASLR protection mechanism by leveraging an "address leak."
EPSS
10 Critical
CVSS2