Executive Summary

Informations
NameCVE-2018-15982First vendor Publication2019-01-18
VendorCveLast vendor Modification2019-01-29

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Flash Player versions 31.0.0.153 and earlier, and 31.0.0.108 and earlier have a use after free vulnerability. Successful exploitation could lead to arbitrary code execution.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15982

CWE : Common Weakness Enumeration

%idName
100 %CWE-416Use After Free

CPE : Common Platform Enumeration

TypeDescriptionCount
Application498
Application1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1
Os1

Snort® IPS/IDS

DateDescription
2019-02-21Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48906 - Revision : 1 - Type : FILE-FLASH
2019-02-21Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48905 - Revision : 1 - Type : FILE-FLASH
2019-01-10Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48567 - Revision : 1 - Type : FILE-FLASH
2019-01-10Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48566 - Revision : 1 - Type : FILE-FLASH
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48496 - Revision : 1 - Type : FILE-FLASH
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48495 - Revision : 1 - Type : FILE-FLASH
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48494 - Revision : 1 - Type : FILE-FLASH
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48493 - Revision : 1 - Type : FILE-FLASH
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48492 - Revision : 1 - Type : FILE-FLASH
2019-01-08Adobe Flash Player TVSDK metadata use after free attempt
RuleID : 48491 - Revision : 1 - Type : FILE-FLASH

Nessus® Vulnerability Scanner

DateDescription
2018-12-07Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_49cbe200f92a11e8a89dd43d7ef03aa6.nasl - Type : ACT_GATHER_INFO
2018-12-06Name : The remote Windows host has a browser plugin installed that is affected by mu...
File : flash_player_apsb18-42.nasl - Type : ACT_GATHER_INFO
2018-12-06Name : The remote macOS or Mac OSX host has a browser plugin installed that is affec...
File : macosx_flash_player_apsb18-42.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/106116
CONFIRM https://helpx.adobe.com/security/products/flash-player/apsb18-42.html
EXPLOIT-DB https://www.exploit-db.com/exploits/46051/
REDHAT https://access.redhat.com/errata/RHSA-2018:3795

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-01-30 00:18:37
  • Multiple Updates
2019-01-21 05:18:28
  • Multiple Updates
2019-01-18 21:19:22
  • First insertion