6.8
CVSSv2

CVE-2012-1175

Published: 26/08/2012 Updated: 27/08/2012
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the GnashImage::size method in libbase/GnashImage.h in GNU Gnash 0.8.10 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SWF file, which triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu gnash 0.8.10

Vendor Advisories

Debian Bug report logs - #605419 CVE-2010-4337 gnash: configure creates temp files insecurely Package: src:gnash; Maintainer for src:gnash is Debian Flash Team <pkg-flash-devel@listsaliothdebianorg>; Reported by: Jakub Wilk <jwilk@debianorg> Date: Mon, 29 Nov 2010 20:09:01 UTC Severity: normal Tags: security, squ ...
Debian Bug report logs - #664023 [CVE-2012-1175] gnash integer overflow Package: gnash; Maintainer for gnash is Debian Flash Team <pkg-flash-devel@listsaliothdebianorg>; Source for gnash is src:gnash (PTS, buildd, popcon) Reported by: Luciano Bello <luciano@debianorg> Date: Wed, 14 Mar 2012 22:27:16 UTC Severity ...
Several vulnerabilities have been identified in Gnash, the GNU Flash player CVE-2012-1175 Tielei Wang from Georgia Tech Information Security Center discovered a vulnerability in GNU Gnash which is caused due to an integer overflow error and can be exploited to cause a heap-based buffer overflow by tricking a user into opening a specially ...