Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-0556 | First vendor Publication | 2014-09-09 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK & Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0559. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0556 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:26813 | |||
Oval ID: | oval:org.mitre.oval:def:26813 | ||
Title: | Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows, Adobe AIR before 15.0.0.249 on Windows allows allow attackers to bypass intended access restrictions | ||
Description: | Heap-based buffer overflow in Adobe Flash Player before 13.0.0.244 and 14.x and 15.x before 15.0.0.152 on Windows and OS X and before 11.2.202.406 on Linux, Adobe AIR before 15.0.0.249 on Windows and OS X and before 15.0.0.252 on Android, Adobe AIR SDK before 15.0.0.249, and Adobe AIR SDK & Compiler before 15.0.0.249 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0559. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-0556 | Version: | 6 |
Platform(s): | Microsoft Windows Server 2012 R2 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows Server 2008 R2 Microsoft Windows 7 Microsoft Windows Server 2008 Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows XP | Product(s): | Adobe AIR Adobe Flash Player ActiveX Control |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2016-03-22 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 37711 - Revision : 3 - Type : FILE-FLASH |
2016-03-22 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 37710 - Revision : 2 - Type : FILE-FLASH |
2016-03-22 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 37709 - Revision : 1 - Type : FILE-FLASH |
2016-03-22 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 37708 - Revision : 1 - Type : FILE-FLASH |
2016-03-15 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 37645 - Revision : 2 - Type : FILE-FLASH |
2016-03-15 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 37644 - Revision : 1 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36177 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36176 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36175 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36174 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36173 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36172 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36171 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36170 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36169 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36168 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36167 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36166 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36165 - Revision : 4 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36164 - Revision : 3 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36163 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36162 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36161 - Revision : 2 - Type : FILE-FLASH |
2016-03-14 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 36160 - Revision : 2 - Type : FILE-FLASH |
2015-04-30 | Nuclear exploit kit obfuscated file download RuleID : 33983 - Revision : 5 - Type : EXPLOIT-KIT |
2015-04-30 | Nuclear exploit kit landing page detected RuleID : 33982 - Revision : 3 - Type : EXPLOIT-KIT |
2015-04-30 | Nuclear exploit kit flash file download RuleID : 33981 - Revision : 4 - Type : EXPLOIT-KIT |
2014-11-16 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 32098 - Revision : 5 - Type : FILE-FLASH |
2014-11-16 | Adobe Flash copyPixelsToByteArray integer overflow attempt RuleID : 32097 - Revision : 4 - Type : FILE-FLASH |
Metasploit Database
id | Description |
---|---|
2014-09-23 | Adobe Flash Player copyPixelsToByteArray Method Integer Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-09-26 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_ca44b64c445311e49ea1c485083ca99c.nasl - Type : ACT_GATHER_INFO |
2014-09-22 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201409-05.nasl - Type : ACT_GATHER_INFO |
2014-09-14 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_flash-player-140910.nasl - Type : ACT_GATHER_INFO |
2014-09-11 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-535.nasl - Type : ACT_GATHER_INFO |
2014-09-11 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2014-1173.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Windows host contains a version of Adobe AIR that is affected by m... File : adobe_air_apsb14-21.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Windows host has a browser plugin that is affected by multiple vul... File : flash_player_apsb14-21.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote host contains a web browser that is affected by multiple vulnerabi... File : google_chrome_37_0_2062_120.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Mac OS X host contains a version of Adobe AIR that is affected by ... File : macosx_adobe_air_15_0_0_249.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Mac OS X host has a browser plugin that is affected by multiple vu... File : macosx_flash_player_15_0_0_152.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote Mac OS X host contains a web browser that is affected by multiple ... File : macosx_google_chrome_37_0_2062_120.nasl - Type : ACT_GATHER_INFO |
2014-09-10 | Name : The remote host has an ActiveX control installed that is affected by multiple... File : smb_kb2987114.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:38:44 |
|
2020-05-23 13:17:04 |
|
2020-05-23 01:50:53 |
|
2020-05-23 00:39:35 |
|
2019-08-27 12:06:07 |
|
2019-07-30 12:06:07 |
|
2019-07-17 12:05:54 |
|
2019-06-15 12:05:47 |
|
2018-12-14 12:03:06 |
|
2018-10-30 12:06:36 |
|
2018-07-10 12:02:04 |
|
2018-03-02 01:00:51 |
|
2017-09-08 12:04:14 |
|
2017-08-29 09:24:25 |
|
2017-01-07 09:25:19 |
|
2016-11-04 01:00:44 |
|
2016-10-18 12:03:38 |
|
2016-10-15 12:03:12 |
|
2016-09-17 12:01:40 |
|
2016-07-14 12:00:34 |
|
2016-06-28 22:32:07 |
|
2016-04-27 00:07:34 |
|
2015-05-12 09:27:22 |
|
2015-04-30 21:26:05 |
|
2015-04-17 05:25:42 |
|
2014-11-16 21:24:51 |
|
2014-11-14 13:27:24 |
|
2014-09-27 13:28:21 |
|
2014-09-23 13:26:45 |
|
2014-09-14 13:26:42 |
|
2014-09-12 13:27:13 |
|
2014-09-10 21:24:17 |
|
2014-09-10 13:26:13 |
|
2014-09-10 09:23:34 |
|