Vulnerabilidad en Reproductor Adobe Flash Player (CVE-2008-4546)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-399
Error en la gestión de recursos
Fecha de publicación:
14/10/2008
Última modificación:
09/04/2025
Descripción
Adobe Flash Player 9.0.45.0, 9.0.112.0, 9.0.124.0, y 10.0.12.10 permite a los servidores web remotos causar una denegación de servicio (referencia a puntero nulo y finalización de la aplicación) devolviendo una respuesta inapropiada cuando una solicitud HTTP se envía por segunda vez, como lo demuestran las respuestas que proporcionan dos ficheros SWF con números de versión SWF diferentes.
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
- http://secunia.com/advisories/32759
- http://secunia.com/advisories/40545
- http://secunia.com/advisories/43026
- http://security.gentoo.org/glsa/glsa-201101-09.xml
- http://securityreason.com/securityalert/4401
- http://securitytracker.com/id?1024085=
- http://securitytracker.com/id?1024086=
- http://support.apple.com/kb/HT4435
- http://www.adobe.com/support/security/bulletins/apsb10-14.html
- http://www.mochimedia.com/~matthew/flashcrash/
- http://www.redhat.com/support/errata/RHSA-2010-0464.html
- http://www.redhat.com/support/errata/RHSA-2010-0470.html
- http://www.securityfocus.com/archive/1/496929/100/0/threaded
- http://www.securityfocus.com/bid/31537
- http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
- http://www.us-cert.gov/cas/techalerts/TA10-162A.html
- http://www.vupen.com/english/advisories/2010/1421
- http://www.vupen.com/english/advisories/2010/1432
- http://www.vupen.com/english/advisories/2010/1434
- http://www.vupen.com/english/advisories/2010/1453
- http://www.vupen.com/english/advisories/2010/1482
- http://www.vupen.com/english/advisories/2010/1522
- http://www.vupen.com/english/advisories/2010/1793
- http://www.vupen.com/english/advisories/2011/0192
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45630
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16302
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7187
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
- http://secunia.com/advisories/32759
- http://secunia.com/advisories/40545
- http://secunia.com/advisories/43026
- http://security.gentoo.org/glsa/glsa-201101-09.xml
- http://securityreason.com/securityalert/4401
- http://securitytracker.com/id?1024085=
- http://securitytracker.com/id?1024086=
- http://support.apple.com/kb/HT4435
- http://www.adobe.com/support/security/bulletins/apsb10-14.html
- http://www.mochimedia.com/~matthew/flashcrash/
- http://www.redhat.com/support/errata/RHSA-2010-0464.html
- http://www.redhat.com/support/errata/RHSA-2010-0470.html
- http://www.securityfocus.com/archive/1/496929/100/0/threaded
- http://www.securityfocus.com/bid/31537
- http://www.turbolinux.co.jp/security/2010/TLSA-2010-19j.txt
- http://www.us-cert.gov/cas/techalerts/TA10-162A.html
- http://www.vupen.com/english/advisories/2010/1421
- http://www.vupen.com/english/advisories/2010/1432
- http://www.vupen.com/english/advisories/2010/1434
- http://www.vupen.com/english/advisories/2010/1453
- http://www.vupen.com/english/advisories/2010/1482
- http://www.vupen.com/english/advisories/2010/1522
- http://www.vupen.com/english/advisories/2010/1793
- http://www.vupen.com/english/advisories/2011/0192
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45630
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16302
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7187