HIGH · 8.8

CVE-2017-11292

Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to ty...

Vulnerability Description

Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to type confusion, and successful exploitation could lead to arbitrary code execution.

CVSS Score

8.8

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
AdobeFlash Player Desktop Runtime<= 27.0.0.159
AppleMac Os X-
LinuxLinux Kernel-
MicrosoftWindows-
AdobeFlash Player<= 27.0.0.130
MicrosoftWindows 10-
MicrosoftWindows 8.1-
GoogleChrome Os-
RedhatEnterprise Linux Desktop6.0
RedhatEnterprise Linux Server6.0
RedhatEnterprise Linux Workstation6.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-11292?

CVE-2017-11292 is a vulnerability with a CVSS score of 8.8 (HIGH). Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to ty...

How severe is CVE-2017-11292?

CVE-2017-11292 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2017-11292?

Check the references section above for vendor advisories and patch information. Affected products include: Adobe Flash Player Desktop Runtime, Apple Mac Os X, Linux Linux Kernel, Microsoft Windows, Adobe Flash Player.