← Retour aux CVEs
CVE-2012-2034
HIGHCISA KEV7.5
Description
Adobe Flash Player before 10.3.183.20 and 11.x before 11.3.300.257 on Windows and Mac OS X; before 10.3.183.20 and 11.x before 11.2.202.236 on Linux; before 11.1.111.10 on Android 2.x and 3.x; and before 11.1.115.9 on Android 4.x, and Adobe AIR before 3.3.0.3610, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-2037.
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie6/9/2012
Derniere modification4/21/2026
Sourcekev
Observations honeypot0
CISA KEV
FournisseurAdobe
ProduitFlash Player
Nom vulnerabiliteAdobe Flash Player Memory Corruption Vulnerability
Date ajout KEV2022-03-28
Date limite remediation2022-04-18
Utilise dans ransomwareUnknown
Produits affectes
adobe:airadobe:flash_playerapple:macosgoogle:androidlinux:linux_kernelmicrosoft:windowsopensuse:opensuseredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_workstationsuse:linux_enterprise_desktop
Faiblesses (CWE)
CWE-119CWE-119
References
http://rhn.redhat.com/errata/RHSA-2012-0722.html(psirt@adobe.com)
http://www.adobe.com/support/security/bulletins/apsb12-14.html(psirt@adobe.com)
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2012-06/msg00007.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2012-0722.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.adobe.com/support/security/bulletins/apsb12-14.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-2034(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.