语言:
https://helpx.adobe.com/security/products/flash-player/apsb14-21.html
https://access.redhat.com/errata/RHSA-2014:1173
https://access.redhat.com/security/cve/cve-2014-0549
https://access.redhat.com/security/cve/cve-2014-0548
https://access.redhat.com/security/cve/cve-2014-0559
https://access.redhat.com/security/cve/cve-2014-0554
https://access.redhat.com/security/cve/cve-2014-0552
https://access.redhat.com/security/cve/cve-2014-0553
https://access.redhat.com/security/cve/cve-2014-0550
https://access.redhat.com/security/cve/cve-2014-0551
https://access.redhat.com/security/cve/cve-2014-0556
https://access.redhat.com/security/cve/cve-2014-0557
严重性: Critical
ID: 77628
文件名: redhat-RHSA-2014-1173.nasl
版本: 1.27
类型: local
代理: unix
发布时间: 2014/9/11
最近更新时间: 2021/1/14
支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
风险因素: Critical
分数: 9.4
风险因素: Critical
基本分数: 10
时间分数: 8.7
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE: cpe:/o:redhat:enterprise_linux:6.5, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:flash-plugin
必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
可利用: true
易利用性: Exploits are available
补丁发布日期: 2014/9/10
漏洞发布日期: 2014/9/9
CANVAS (CANVAS)
Core Impact
Metasploit (Adobe Flash Player copyPixelsToByteArray Method Integer Overflow)
CVE: CVE-2014-0547, CVE-2014-0548, CVE-2014-0549, CVE-2014-0550, CVE-2014-0551, CVE-2014-0552, CVE-2014-0553, CVE-2014-0554, CVE-2014-0555, CVE-2014-0556, CVE-2014-0557, CVE-2014-0559
BID: 69695, 69696, 69697, 69699, 69700, 69701, 69702, 69703, 69704, 69705, 69706, 69707
RHSA: 2014:1173