CVE-2006-3311

Buffer overflow in Adobe Flash Player 8.0.24.0 and earlier, Flash Professional 8, Flash MX 2004, and Flex 1.5 allows user-assisted remote attackers to execute arbitrary code via a long, dynamically created string in a SWF movie.
References
Link Resource
http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html
http://secunia.com/advisories/21865 Patch Vendor Advisory
http://secunia.com/advisories/21901
http://secunia.com/advisories/22054
http://secunia.com/advisories/22187
http://secunia.com/advisories/22268
http://secunia.com/advisories/22882
http://security.gentoo.org/glsa/glsa-200610-02.xml
http://securityreason.com/securityalert/1546
http://securitytracker.com/id?1016829
http://www.adobe.com/support/security/bulletins/apsb06-11.html Patch
http://www.computerterrorism.com/research/ct12-09-2006.htm Exploit Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/451380 US Government Resource
http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html
http://www.redhat.com/support/errata/RHSA-2006-0674.html
http://www.securityfocus.com/archive/1/445825/100/0/threaded
http://www.securityfocus.com/bid/19980
http://www.us-cert.gov/cas/techalerts/TA06-275A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-318A.html US Government Resource
http://www.vupen.com/english/advisories/2006/3573
http://www.vupen.com/english/advisories/2006/3577
http://www.vupen.com/english/advisories/2006/3852
http://www.vupen.com/english/advisories/2006/4507
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069
https://exchange.xforce.ibmcloud.com/vulnerabilities/28886
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A394
http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html
http://secunia.com/advisories/21865 Patch Vendor Advisory
http://secunia.com/advisories/21901
http://secunia.com/advisories/22054
http://secunia.com/advisories/22187
http://secunia.com/advisories/22268
http://secunia.com/advisories/22882
http://security.gentoo.org/glsa/glsa-200610-02.xml
http://securityreason.com/securityalert/1546
http://securitytracker.com/id?1016829
http://www.adobe.com/support/security/bulletins/apsb06-11.html Patch
http://www.computerterrorism.com/research/ct12-09-2006.htm Exploit Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/451380 US Government Resource
http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html
http://www.redhat.com/support/errata/RHSA-2006-0674.html
http://www.securityfocus.com/archive/1/445825/100/0/threaded
http://www.securityfocus.com/bid/19980
http://www.us-cert.gov/cas/techalerts/TA06-275A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-318A.html US Government Resource
http://www.vupen.com/english/advisories/2006/3573
http://www.vupen.com/english/advisories/2006/3577
http://www.vupen.com/english/advisories/2006/3852
http://www.vupen.com/english/advisories/2006/4507
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069
https://exchange.xforce.ibmcloud.com/vulnerabilities/28886
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A394
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:8:*:pro:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:mx_2004:*:*:*:*:*:*:*
cpe:2.3:a:adobe:flex_sdk:1.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:13

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html - () http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html -
References () http://secunia.com/advisories/21865 - Patch, Vendor Advisory () http://secunia.com/advisories/21865 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21901 - () http://secunia.com/advisories/21901 -
References () http://secunia.com/advisories/22054 - () http://secunia.com/advisories/22054 -
References () http://secunia.com/advisories/22187 - () http://secunia.com/advisories/22187 -
References () http://secunia.com/advisories/22268 - () http://secunia.com/advisories/22268 -
References () http://secunia.com/advisories/22882 - () http://secunia.com/advisories/22882 -
References () http://security.gentoo.org/glsa/glsa-200610-02.xml - () http://security.gentoo.org/glsa/glsa-200610-02.xml -
References () http://securityreason.com/securityalert/1546 - () http://securityreason.com/securityalert/1546 -
References () http://securitytracker.com/id?1016829 - () http://securitytracker.com/id?1016829 -
References () http://www.adobe.com/support/security/bulletins/apsb06-11.html - Patch () http://www.adobe.com/support/security/bulletins/apsb06-11.html - Patch
References () http://www.computerterrorism.com/research/ct12-09-2006.htm - Exploit, Patch, Vendor Advisory () http://www.computerterrorism.com/research/ct12-09-2006.htm - Exploit, Patch, Vendor Advisory
References () http://www.kb.cert.org/vuls/id/451380 - US Government Resource () http://www.kb.cert.org/vuls/id/451380 - US Government Resource
References () http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html - () http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0674.html - () http://www.redhat.com/support/errata/RHSA-2006-0674.html -
References () http://www.securityfocus.com/archive/1/445825/100/0/threaded - () http://www.securityfocus.com/archive/1/445825/100/0/threaded -
References () http://www.securityfocus.com/bid/19980 - () http://www.securityfocus.com/bid/19980 -
References () http://www.us-cert.gov/cas/techalerts/TA06-275A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-275A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA06-318A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-318A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/3573 - () http://www.vupen.com/english/advisories/2006/3573 -
References () http://www.vupen.com/english/advisories/2006/3577 - () http://www.vupen.com/english/advisories/2006/3577 -
References () http://www.vupen.com/english/advisories/2006/3852 - () http://www.vupen.com/english/advisories/2006/3852 -
References () http://www.vupen.com/english/advisories/2006/4507 - () http://www.vupen.com/english/advisories/2006/4507 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/28886 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/28886 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A394 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A394 -

Information

Published : 2006-09-12 23:07

Updated : 2024-11-21 00:13


NVD link : CVE-2006-3311

Mitre link : CVE-2006-3311

CVE.ORG link : CVE-2006-3311


JSON object : View

Products Affected

adobe

  • flash_player
  • flex_sdk