First published: Thu Dec 03 2009(Updated: )
Heap-based buffer overflow in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 allows remote attackers to execute arbitrary code via crafted dimensions of JPEG data in an SWF file.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/flash-plugin | <0:9.0.260.0-1.el3 | 0:9.0.260.0-1.el3 |
redhat/flash-plugin | <0:9.0.260.0-1.el4 | 0:9.0.260.0-1.el4 |
redhat/flash-plugin | <0:10.0.42.34-1.el5 | 0:10.0.42.34-1.el5 |
Adobe Adobe Air | =1.0 | |
Adobe Flash Player | =9.125.0 | |
Adobe Adobe Air | =1.5.1 | |
Adobe Flash Player | =8.0.24.0 | |
Adobe Flash Player | =9.0.18d60 | |
Adobe Flash Player | =7.1.1 | |
Adobe Flash Player | =9.0.124.0 | |
Adobe Flash Player | =9.0.47.0 | |
Adobe Flash Player | =7.0.63 | |
Adobe Flash Player | =7.0.70.0 | |
Adobe Flash Player | =10.0.12.36 | |
Adobe Flash Player | =8.0.35.0 | |
Adobe Flash Player | =9.0.114.0 | |
Adobe Flash Player | =8.0 | |
Adobe Flash Player | =9.0.20.0 | |
Adobe Flash Player | =9.0.31.0 | |
Adobe Flash Player | =9.0.159.0 | |
Adobe Flash Player | =9.0.112.0 | |
Adobe Flash Player | =9.0.16 | |
Adobe Flash Player | =8 | |
Adobe Flash Player | =10.0.0.584 | |
Adobe Flash Player | =9.0.28.0 | |
Adobe Flash Player | =7.0.69.0 | |
Adobe Flash Player | =9.0.155.0 | |
Adobe Flash Player | =10.0.22.87 | |
Adobe Flash Player | =9.0.28 | |
Adobe Flash Player | =9.0.45.0 | |
Adobe Flash Player | =7.0 | |
Adobe Flash Player | =9.0.31 | |
Adobe Flash Player | =7.2 | |
Adobe Adobe Air | <=1.5.2 | |
Adobe Flash Player | =9.0.115.0 | |
Adobe Flash Player | =7.0.25 | |
Adobe Flash Player | =8.0 | |
Adobe Flash Player | =8.0.39.0 | |
Adobe Adobe Air | =1.0.1 | |
Adobe Flash Player | =8.0.34.0 | |
Adobe Flash Player | =8 | |
Adobe Adobe Air | =1.1 | |
Adobe Flash Player | =7.1 | |
Adobe Flash Player | =10.0.12.10 | |
Adobe Flash Player | <=10.0.32.18 | |
Adobe Flash Player | =9.0.20 | |
Adobe Flash Player | =7.0.1 | |
Adobe Flash Player | =8.0 | |
Adobe Flash Player | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.