First published: Tue Nov 11 2014(Updated: )
Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK & Compiler before 15.0.0.356 allow remote attackers to discover session tokens via unspecified vectors.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Flash Player for Internet Explorer 11 | >=13.0<13.0.0.252 | |
Adobe Flash Player for Internet Explorer 11 | >=14.0<=14.0.0.179 | |
Adobe Flash Player for Internet Explorer 11 | >=15.0<15.0.0.223 | |
macOS Yosemite | ||
Microsoft Windows | ||
Adobe Flash Player for Internet Explorer 11 | >=11.0<11.2.202.418 | |
Linux Kernel | ||
Adobe AIR SDK and Compiler | <=15.0.0.356 | |
Adobe AIR | <=15.0.0.356 | |
Adobe AIR SDK & Compiler | <15.0.0.356 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8437 has a severity rating of medium to high due to the potential for remote attackers to discover session tokens.
To fix CVE-2014-8437, update Adobe Flash Player to version 13.0.0.252 or later, 14.x to version 14.0.0.180 or later, or 15.x to version 15.0.0.223 or later.
CVE-2014-8437 affects Adobe Flash Player versions before 13.0.0.252, 14.x before 14.0.0.180, and 15.x before 15.0.0.223, as well as Adobe AIR versions before 15.0.0.356.
Yes, CVE-2014-8437 can be exploited in Adobe AIR environments that are running versions before 15.0.0.356.
CVE-2014-8437 affects Windows, OS X, and Linux systems that are running vulnerable versions of Adobe Flash Player and Adobe AIR.