First published: Wed Dec 12 2012(Updated: )
Buffer overflow in Adobe Flash Player before 10.3.183.48 and 11.x before 11.5.502.135 on Windows, before 10.3.183.48 and 11.x before 11.5.502.136 on Mac OS X, before 10.3.183.48 and 11.x before 11.2.202.258 on Linux, before 11.1.111.29 on Android 2.x and 3.x, and before 11.1.115.34 on Android 4.x; Adobe AIR before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X; and Adobe AIR SDK before 3.5.0.880 on Windows and before 3.5.0.890 on Mac OS X allows attackers to execute arbitrary code via unspecified vectors.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Flash Player for Internet Explorer 11 | >=10.3<10.3.183.48 | |
Adobe Flash Player for Internet Explorer 11 | >=11.5<11.5.502.135 | |
Microsoft Windows | ||
Adobe Flash Player for Internet Explorer 11 | >=11.2<11.2.202.258 | |
Linux Kernel | ||
Adobe Flash Player for Internet Explorer 11 | >=11.1<11.1.111.29 | |
Google Android | >=2.0<=2.3.7 | |
Google Android | >=3.0<=3.2.6 | |
Adobe Flash Player for Internet Explorer 11 | >=11.1<11.1.115.34 | |
Google Android | >=4.0<=4.4.4 | |
Adobe AIR | <3.5.0.880 | |
Adobe Flash Player for Internet Explorer 11 | >=11.5<11.5.502.136 | |
macOS Yosemite | ||
Adobe AIR | <3.5.0.890 | |
Adobe AIR SDK and Compiler | <3.5.0.880 | |
Adobe AIR SDK and Compiler | <3.5.0.890 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5676 is rated as a high-severity vulnerability due to its potential for causing buffer overflow and leading to remote code execution.
To fix CVE-2012-5676, update Adobe Flash Player to version 10.3.183.48 or later for Windows and to version 11.5.502.135 or later for Mac OS X.
CVE-2012-5676 affects multiple platforms including Windows, Mac OS X, Linux, and Android operating systems.
Yes, Adobe Flash Player versions before 10.3.183.48 and 11.x before 11.5.502.135 are susceptible to CVE-2012-5676.
Yes, CVE-2012-5676 can be exploited remotely, allowing attackers to execute arbitrary code on the affected systems.