4.3
CVSSv2

CVE-2008-4546

Published: 14/10/2008 Updated: 11/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Adobe Flash Player prior to 9.0.277.0 and 10.x prior to 10.1.53.64, and Adobe AIR prior to 2.0.2.12610, allows remote web servers to cause a denial of service (NULL pointer dereference and browser crash) by returning a different response when an HTTP request is sent a second time, as demonstrated by two responses that provide SWF files with different SWF version numbers.

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash player 9.0.45.0

adobe flash player 10.0.12.10

adobe flash player 9.0.115.0

adobe flash player 9.0.112.0

Exploits

source: wwwsecurityfocuscom/bid/31537/info Adobe Flash Player Plugin is prone to a remote denial-of-service vulnerability Successfully exploiting this issue will allow attackers to crash the browser that uses the plugin, denying service to legitimate users The following versions of Flash Player Plugin are vulnerable: 90450 90112 ...

References

CWE-399http://www.mochimedia.com/~matthew/flashcrash/http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.htmlhttp://secunia.com/advisories/32759http://www.securityfocus.com/bid/31537http://securityreason.com/securityalert/4401http://securitytracker.com/id?1024086http://securitytracker.com/id?1024085http://www.adobe.com/support/security/bulletins/apsb10-14.htmlhttp://www.vupen.com/english/advisories/2010/1453http://www.redhat.com/support/errata/RHSA-2010-0464.htmlhttp://www.us-cert.gov/cas/techalerts/TA10-162A.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0470.htmlhttp://www.vupen.com/english/advisories/2010/1421http://www.vupen.com/english/advisories/2010/1434http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.htmlhttp://www.vupen.com/english/advisories/2010/1432http://www.vupen.com/english/advisories/2010/1482http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.htmlhttp://www.vupen.com/english/advisories/2010/1522http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txthttp://www.vupen.com/english/advisories/2010/1793http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751http://secunia.com/advisories/40545http://support.apple.com/kb/HT4435http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.htmlhttp://security.gentoo.org/glsa/glsa-201101-09.xmlhttp://www.vupen.com/english/advisories/2011/0192http://secunia.com/advisories/43026https://exchange.xforce.ibmcloud.com/vulnerabilities/45630https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7187https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16302http://www.securityfocus.com/archive/1/496929/100/0/threadedhttps://nvd.nist.govhttps://www.exploit-db.com/exploits/32452/