Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-2421 | First vendor Publication | 2011-08-11 |
Vendor | Cve | Last vendor Modification | 2011-10-05 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Dirapi.dll in Adobe Shockwave Player before 11.6.1.629 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir media file. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2421 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-08-29 | Name : Adobe Shockwave Player Multiple Remote Code Execution Vulnerabilities - Aug 2011 File : nvt/secpod_adobe_shockwave_player_mult_code_exec_vuln_aug11.nasl |
2011-08-29 | Name : Adobe Shockwave Player Multiple Remote Code Execution Vulnerabilities (Mac OS X) File : nvt/secpod_adobe_shockwave_player_mult_code_exec_vuln_macosx.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
74427 | Adobe Shockwave Player Dirapi.dll Director Movie File Handling Unspecified Me... A memory corruption flaw exists in Adobe Shockwave Player. The Dirapi.dll component fails to sanitize user-supplied input, resulting in memory corruption. With a specially crafted director (.dir) movie file, a context-dependent attacker can execute arbitrary code. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-12-22 | Name : The remote Mac OS X host contains a web browser plugin that is affected by mu... File : macosx_shockwave_player_apsb11-19.nasl - Type : ACT_GATHER_INFO |
2013-05-04 | Name : An application on the remote Windows host has a cross-site scripting vulnerab... File : robohelp_apsb11_23.nasl - Type : ACT_GATHER_INFO |
2011-08-12 | Name : The remote Windows host contains a web browser plugin that is affected by mul... File : shockwave_player_apsb11-19.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|---|
CERT | http://www.us-cert.gov/cas/techalerts/TA11-222A.html |
CONFIRM | http://www.adobe.com/support/security/bulletins/apsb11-19.html |
Alert History
Date | Informations |
---|---|
2021-05-04 12:14:40 |
|
2021-04-22 01:15:59 |
|
2020-05-23 01:44:45 |
|
2020-05-23 00:28:52 |
|
2018-03-21 12:01:23 |
|
2016-04-26 20:50:45 |
|
2014-12-23 13:26:03 |
|
2014-02-17 11:03:06 |
|
2013-05-10 23:02:23 |
|