CVE-2016-4232

Published on: 07/12/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:26:58 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Certain versions of Flash Player from Adobe contain the following vulnerability:

Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to obtain sensitive information from process memory via unspecified vectors.

  • CVE-2016-4232 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH NONE NONE

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL NONE NONE

CVE References

Description Tags Link
Adobe Flash - Transform.colorTranform Getter Infomation Leak - Multiple dos Exploit www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 40355
[security-announce] openSUSE-SU-2016:1802-1: important: Security update lists.opensuse.org
text/html
URL Logo SUSE openSUSE-SU-2016:1802
[security-announce] SUSE-SU-2016:1826-1: important: Security update for lists.opensuse.org
text/html
URL Logo SUSE SUSE-SU-2016:1826
Adobe Flash Player Multiple Bugs Lets Remote Users Execute Arbitrary Code, Bypass Security Restrictions, and Obtain Potentially Sensitive Information - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1036280
Adobe Flash Player CVE-2016-4232 Unspecified Information Disclosure Vulnerability cve.report (archive)
text/html
URL Logo BID 91724
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:1423
Adobe Security Bulletin Patch
Vendor Advisory
helpx.adobe.com
text/html
URL Logo CONFIRM helpx.adobe.com/security/products/flash-player/apsb16-25.html
Adobe Flash Player: Multiple vulnerabilities (GLSA 201607-03) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201607-03
Microsoft Security Bulletin MS16-093 - Critical | Microsoft Docs docs.microsoft.com
text/html
URL Logo MS MS16-093

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationAdobeFlash PlayerAllAllAllAll
ApplicationAdobeFlash PlayerAllAllAllAll
ApplicationAdobeFlash PlayerAllAllAllAll
ApplicationAdobeFlash PlayerAllAllAllAll
ApplicationAdobeFlash PlayerAllAllAllAll
ApplicationAdobeFlash PlayerAllAllAllAll
Operating
System
AppleMac Os XAllAllAllAll
Operating
System
AppleMac Os XAllAllAllAll
Operating
System
GoogleChrome OsAllAllAllAll
Operating
System
GoogleChrome OsAllAllAllAll
Operating
System
LinuxLinux KernelAllAllAllAll
Operating
System
LinuxLinux KernelAllAllAllAll
Operating
System
MicrosoftWindowsAllAllAllAll
Operating
System
MicrosoftWindowsAllAllAllAll
Operating
System
MicrosoftWindows 10AllAllAllAll
Operating
System
MicrosoftWindows 10AllAllAllAll
Operating
System
MicrosoftWindows 8.1AllAllAllAll
Operating
System
MicrosoftWindows 8.1AllAllAllAll
  • cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:adobe:flash_player:*:*:*:*:esr:*:*:*:
  • cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*:
  • cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*:
  • cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*:
  • cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*: