← Retour aux CVEs
CVE-2018-4878
HIGHCISA KEV7.8
Description
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
Details CVE
Score CVSS v3.17.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie2/6/2018
Derniere modification11/18/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurAdobe
ProduitFlash Player
Nom vulnerabiliteAdobe Flash Player Use-After-Free Vulnerability
Date ajout KEV2021-11-03
Date limite remediation2022-05-03
Utilise dans ransomwareKnown
Produits affectes
adobe:flash_playerapple:macosgoogle:chrome_oslinux:linux_kernelmicrosoft:windowsmicrosoft:windows_10microsoft:windows_8.1redhat:enterprise_linux_desktopredhat:enterprise_linux_serverredhat:enterprise_linux_workstation
Faiblesses (CWE)
CWE-416CWE-416
References
http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html(psirt@adobe.com)
http://www.securityfocus.com/bid/102893(psirt@adobe.com)
http://www.securitytracker.com/id/1040318(psirt@adobe.com)
https://access.redhat.com/errata/RHSA-2018:0285(psirt@adobe.com)
https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign(psirt@adobe.com)
https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flash-DRM-UAF-0day(psirt@adobe.com)
https://github.com/vysec/CVE-2018-4878(psirt@adobe.com)
https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-protection-mechanism/(psirt@adobe.com)
https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reappears-in-malicious-word-files/d/d-id/1331139(psirt@adobe.com)
https://www.exploit-db.com/exploits/44412/(psirt@adobe.com)
https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html(psirt@adobe.com)
http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/102893(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040318(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:0285(af854a3a-2127-422b-91ae-364da2661108)
https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flash-DRM-UAF-0day(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/vysec/CVE-2018-4878(af854a3a-2127-422b-91ae-364da2661108)
https://helpx.adobe.com/security/products/flash-player/apsb18-03.html(af854a3a-2127-422b-91ae-364da2661108)
https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-protection-mechanism/(af854a3a-2127-422b-91ae-364da2661108)
https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/(af854a3a-2127-422b-91ae-364da2661108)
https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reappears-in-malicious-word-files/d/d-id/1331139(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44412/(af854a3a-2127-422b-91ae-364da2661108)
https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/north-korean-hackers-allegedly-exploit-adobe-flash-player-vulnerability-cve-2018-4878-against-south-korean-targets(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/cisagov/vulnrichment/issues/196(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-4878(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.