Vulnerability Details : CVE-2017-3060
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the ActionScript2 code parser. Successful exploitation could lead to arbitrary code execution.
Vulnerability category: Memory Corruption
Products affected by CVE-2017-3060
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*When used together with: Microsoft » Windows 10When used together with: Microsoft » Windows 8.1
- cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*When used together with: Microsoft » Windows 10When used together with: Microsoft » Windows 8.1
Exploit prediction scoring system (EPSS) score for CVE-2017-3060
6.27%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-3060
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2017-3060
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-3060
-
https://security.gentoo.org/glsa/201704-04
Adobe Flash Player: Multiple vulnerabilities (GLSA 201704-04) — Gentoo security
-
https://access.redhat.com/errata/RHSA-2017:0934
RHSA-2017:0934 - Security Advisory - Red Hat Customer Portal
-
https://helpx.adobe.com/security/products/flash-player/apsb17-10.html
Adobe Security BulletinVendor Advisory
-
http://www.securitytracker.com/id/1038225
Adobe Flash Player Use-After-Free and Memory Corruption Errors Let Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.securityfocus.com/bid/97557
Adobe Flash Player APSB17-10 Multiple Memory Corruption VulnerabilitiesThird Party Advisory;VDB Entry
-
http://www.zerodayinitiative.com/advisories/ZDI-17-247/
ZDI-17-247 | Zero Day InitiativeThird Party Advisory;VDB Entry
Jump to