CVE-2006-3587

Unspecified vulnerability in Adobe (Macromedia) Flash Player 8.0.24.0 allows remote attackers to execute arbitrary commands via a malformed .swf file that results in "multiple improper memory access" errors.
References
Link Resource
http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html
http://secunia.com/advisories/20971 Patch Vendor Advisory
http://secunia.com/advisories/21865 Vendor Advisory
http://secunia.com/advisories/21901 Vendor Advisory
http://secunia.com/advisories/22054 Vendor Advisory
http://secunia.com/advisories/22187 Vendor Advisory
http://secunia.com/advisories/22268 Vendor Advisory
http://secunia.com/advisories/22882 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200610-02.xml
http://securitytracker.com/id?1016448
http://securitytracker.com/id?1016829
http://www.adobe.com/support/security/bulletins/apsb06-11.html
http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-20.html Vendor Advisory
http://www.kb.cert.org/vuls/id/474593 Patch US Government Resource
http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html
http://www.redhat.com/support/errata/RHSA-2006-0674.html
http://www.securityfocus.com/bid/18894
http://www.securityfocus.com/bid/19980
http://www.us-cert.gov/cas/techalerts/TA06-318A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2702 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3573 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3577 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3852 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4507 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069
https://exchange.xforce.ibmcloud.com/vulnerabilities/27601
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1050
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A709
http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html
http://secunia.com/advisories/20971 Patch Vendor Advisory
http://secunia.com/advisories/21865 Vendor Advisory
http://secunia.com/advisories/21901 Vendor Advisory
http://secunia.com/advisories/22054 Vendor Advisory
http://secunia.com/advisories/22187 Vendor Advisory
http://secunia.com/advisories/22268 Vendor Advisory
http://secunia.com/advisories/22882 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200610-02.xml
http://securitytracker.com/id?1016448
http://securitytracker.com/id?1016829
http://www.adobe.com/support/security/bulletins/apsb06-11.html
http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-20.html Vendor Advisory
http://www.kb.cert.org/vuls/id/474593 Patch US Government Resource
http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html
http://www.redhat.com/support/errata/RHSA-2006-0674.html
http://www.securityfocus.com/bid/18894
http://www.securityfocus.com/bid/19980
http://www.us-cert.gov/cas/techalerts/TA06-318A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2702 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3573 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3577 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3852 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4507 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069
https://exchange.xforce.ibmcloud.com/vulnerabilities/27601
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1050
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A709
Configurations

Configuration 1 (hide)

cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:13

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html - () http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html -
References () http://secunia.com/advisories/20971 - Patch, Vendor Advisory () http://secunia.com/advisories/20971 - Patch, Vendor Advisory
References () http://secunia.com/advisories/21865 - Vendor Advisory () http://secunia.com/advisories/21865 - Vendor Advisory
References () http://secunia.com/advisories/21901 - Vendor Advisory () http://secunia.com/advisories/21901 - Vendor Advisory
References () http://secunia.com/advisories/22054 - Vendor Advisory () http://secunia.com/advisories/22054 - Vendor Advisory
References () http://secunia.com/advisories/22187 - Vendor Advisory () http://secunia.com/advisories/22187 - Vendor Advisory
References () http://secunia.com/advisories/22268 - Vendor Advisory () http://secunia.com/advisories/22268 - Vendor Advisory
References () http://secunia.com/advisories/22882 - Vendor Advisory () http://secunia.com/advisories/22882 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200610-02.xml - () http://security.gentoo.org/glsa/glsa-200610-02.xml -
References () http://securitytracker.com/id?1016448 - () http://securitytracker.com/id?1016448 -
References () http://securitytracker.com/id?1016829 - () http://securitytracker.com/id?1016829 -
References () http://www.adobe.com/support/security/bulletins/apsb06-11.html - () http://www.adobe.com/support/security/bulletins/apsb06-11.html -
References () http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-20.html - Vendor Advisory () http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-20.html - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/474593 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/474593 - Patch, US Government Resource
References () http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html - () http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0674.html - () http://www.redhat.com/support/errata/RHSA-2006-0674.html -
References () http://www.securityfocus.com/bid/18894 - () http://www.securityfocus.com/bid/18894 -
References () http://www.securityfocus.com/bid/19980 - () http://www.securityfocus.com/bid/19980 -
References () http://www.us-cert.gov/cas/techalerts/TA06-318A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-318A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/2702 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2702 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/3573 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3573 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/3577 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3577 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/3852 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3852 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/4507 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4507 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27601 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27601 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1050 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1050 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A709 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A709 -

Information

Published : 2006-07-13 21:05

Updated : 2024-11-21 00:13


NVD link : CVE-2006-3587

Mitre link : CVE-2006-3587

CVE.ORG link : CVE-2006-3587


JSON object : View

Products Affected

adobe

  • flash_player