CVE-2006-0024
CVSS5.1
发布时间 :2006-03-15 11:06:00
修订时间 :2011-03-07 21:29:11
NMCOPS    

[原文]Multiple unspecified vulnerabilities in Adobe Flash Player 8.0.22.0 and earlier allow remote attackers to execute arbitrary code via a crafted SWF file.


[CNNVD]Macromedia Flash Player SWF文件远程代码执行漏洞(CNNVD-200603-275)

        Macromedia Flash Player是一款非常流行的FLASH播放器。
        Flash Player在处理畸形恶意SWF文件时存在缓冲区溢出漏洞,攻击者可能利用此漏洞在客户机器上执行任意指令。
        如果攻击者诱骗用户使用Flash Player加载了恶意的SWF文件的话,就会完全控制受影响的系统。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: HIGH [漏洞利用存在特定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:macromedia:flash_player:7.0_r19Macromedia Flash 7.0 r19
cpe:/a:macromedia:flash_player:6.0.65.0Macromedia Flash 6.0.65.0
cpe:/a:macromedia:flash_player:8.0.22.0Macromedia Flash 8.0.22.0
cpe:/a:macromedia:flash_player:6.0.40.0Macromedia Flash 6.0.40.0
cpe:/a:macromedia:flash_player:5.0_r50Macromedia Flash 5.0 r50
cpe:/a:macromedia:flash_player:6.0.29.0Macromedia Flash 6.0.29.0
cpe:/a:macromedia:flash_player:6.0.79.0Macromedia Flash 6.0.79.0
cpe:/a:macromedia:flash_player:7.0.19.0Macromedia Flash 7.0.19.0
cpe:/a:macromedia:flash_player:7.0.60.0Macromedia Flash 7.0.60.0
cpe:/a:macromedia:flash_player:6.0Macromedia Flash 6.0
cpe:/a:macromedia:flash_player:5.0Macromedia Flash 5.0
cpe:/a:macromedia:flash_player:7.0.61.0Macromedia Flash 7.0.61.0
cpe:/a:macromedia:flash_player:4.0_r12Macromedia Flash 4.0 r12
cpe:/a:macromedia:flash_player:6.0.47.0Macromedia Flash 6.0.47.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:1922Remote Code Execution Vulnerability in Flash Player 8 (XP,SP2)
oval:org.mitre.oval:def:1894Remote Code Execution Vulnerability in Flash Player 8 (XP,SP1)
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0024
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0024
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-275
(官方数据源) CNNVD

- 其它链接及资源

http://www.us-cert.gov/cas/techalerts/TA07-352A.html
(UNKNOWN)  CERT  TA07-352A
http://www.us-cert.gov/cas/techalerts/TA06-132A.html
(UNKNOWN)  CERT  TA06-132A
http://www.us-cert.gov/cas/techalerts/TA06-129A.html
(UNKNOWN)  CERT  TA06-129A
http://www.us-cert.gov/cas/techalerts/TA06-075A.html
(UNKNOWN)  CERT  TA06-075A
http://www.kb.cert.org/vuls/id/945060
(UNKNOWN)  CERT-VN  VU#945060
http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html
(VENDOR_ADVISORY)  CONFIRM  http://www.macromedia.com/devnet/security/security_zone/apsb06-03.html
http://secunia.com/advisories/19218
(VENDOR_ADVISORY)  SECUNIA  19218
http://xforce.iss.net/xforce/xfdb/25005
(UNKNOWN)  XF  macromedia-swf-code-execution(25005)
http://www.vupen.com/english/advisories/2007/4238
(UNKNOWN)  VUPEN  ADV-2007-4238
http://www.vupen.com/english/advisories/2006/1779
(UNKNOWN)  VUPEN  ADV-2006-1779
http://www.vupen.com/english/advisories/2006/1744
(UNKNOWN)  VUPEN  ADV-2006-1744
http://www.vupen.com/english/advisories/2006/1262
(UNKNOWN)  VUPEN  ADV-2006-1262
http://www.vupen.com/english/advisories/2006/0952
(UNKNOWN)  VUPEN  ADV-2006-0952
http://www.securityfocus.com/bid/17106
(UNKNOWN)  BID  17106
http://www.redhat.com/support/errata/RHSA-2006-0268.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2006:0268
http://www.osvdb.org/23908
(UNKNOWN)  OSVDB  23908
http://www.securityfocus.com/bid/17951
(UNKNOWN)  BID  17951
http://www.opera.com/docs/changelogs/windows/854/
(UNKNOWN)  CONFIRM  http://www.opera.com/docs/changelogs/windows/854/
http://www.novell.com/linux/security/advisories/2006_15_flashplayer.html
(UNKNOWN)  SUSE  SUSE-SA:2006:015
http://www.microsoft.com/technet/security/bulletin/ms06-020.mspx
(UNKNOWN)  MS  MS06-020
http://www.gentoo.org/security/en/glsa/glsa-200603-20.xml
(UNKNOWN)  GENTOO  GLSA-200603-20
http://securitytracker.com/id?1015770
(UNKNOWN)  SECTRACK  1015770
http://secunia.com/advisories/28136
(UNKNOWN)  SECUNIA  28136
http://secunia.com/advisories/20077
(UNKNOWN)  SECUNIA  20077
http://secunia.com/advisories/20045
(UNKNOWN)  SECUNIA  20045
http://secunia.com/advisories/19328
(UNKNOWN)  SECUNIA  19328
http://secunia.com/advisories/19259
(UNKNOWN)  SECUNIA  19259
http://secunia.com/advisories/19198
(UNKNOWN)  SECUNIA  19198
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
(UNKNOWN)  APPLE  APPLE-SA-2007-12-17
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
(UNKNOWN)  APPLE  APPLE-SA-2006-05-11
http://docs.info.apple.com/article.html?artnum=307179
(UNKNOWN)  CONFIRM  http://docs.info.apple.com/article.html?artnum=307179

- 漏洞信息

Macromedia Flash Player SWF文件远程代码执行漏洞
中危 资料不足
2006-03-15 00:00:00 2006-03-17 00:00:00
远程  
        Macromedia Flash Player是一款非常流行的FLASH播放器。
        Flash Player在处理畸形恶意SWF文件时存在缓冲区溢出漏洞,攻击者可能利用此漏洞在客户机器上执行任意指令。
        如果攻击者诱骗用户使用Flash Player加载了恶意的SWF文件的话,就会完全控制受影响的系统。

- 公告与补丁

        暂无数据

- 漏洞信息 (F46386)

Technical Cyber Security Alert 2006-129A (PacketStormID:F46386)
2006-05-21 00:00:00
US-CERT  cert.org
advisory,remote,denial of service,arbitrary,vulnerability
windows
CVE-2006-0027,CVE-2006-0024,CVE-2005-2628
[点击下载]

Technical Cyber Security Alert TA06-129A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows and Exchange Server. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



                        National Cyber Alert System

                Technical Cyber Security Alert TA06-129A


Microsoft Windows and Exchange Server Vulnerabilities

   Original release date: May 9, 2006
   Last revised: --
   Source: US-CERT


Systems Affected

     * Microsoft Windows
     * Microsoft Exchange Server

   For more complete information, refer to the Microsoft Security
   Bulletin Summary for May 2006.


Overview

   Microsoft has released updates that address critical vulnerabilities
   in Microsoft Windows and Exchange Server. Exploitation of these
   vulnerabilities could allow a remote, unauthenticated attacker to
   execute arbitrary code or cause a denial of service on a vulnerable
   system.


I. Description

   Microsoft Security Bulletin Summary for May 2006 addresses
   vulnerabilities in Microsoft Windows and Exchange Server. Further
   information is available in the following US-CERT Vulnerability Notes:


   VU#303452 - Microsoft Exchange fails to properly handle vCal and iCal
   properties 

   Microsoft Exchange Server does not properly handle the vCal and iCal
   properties of email messages. Exploitation of this vulnerability may
   allow a remote, unauthenticated attacker to execute arbitrary code on
   an Exchange Server.
   (CVE-2006-0027)


   VU#945060 - Adobe Flash products contain multiple vulnerabilities 

   Several vulnerabilities in Adobe Macromedia Flash products may allow a
   remote attacker to execute code on a vulnerable system.
   (CVE-2006-0024)


   VU#146284 - Macromedia Flash Player fails to properly validate the
   frame type identifier read from a "SWF" file 

   A buffer overflow vulnerability in some versions of the Macromedia
   Flash Player may allow a remote attacker to execute code on a
   vulnerable system.
   (CVE-2005-2628)


II. Impact

   A remote, unauthenticated attacker could execute arbitrary code on a
   vulnerable system. An attacker may also be able to cause a denial of
   service.


III. Solution

Apply Updates

   Microsoft has provided updates for these vulnerabilities in the
   Security Bulletins. Microsoft Windows updates are available on the
   Microsoft Update site.

Workarounds

   Please see the US-CERT Vulnerability Notes for workarounds.


Appendix A. References

     * Microsoft Security Bulletin Summary for May 2006 -
       <http://www.microsoft.com/technet/security/bulletin/ms06-may.mspx>

     * Technical Cyber Security Alert TA06-075A -
       <http://www.us-cert.gov/cas/techalerts/TA06-075A.html>

     * US-CERT Vulnerability Note VU#303452 -
       <http://www.kb.cert.org/vuls/id/303452>

     * US-CERT Vulnerability Note VU#945060 -
       <http://www.kb.cert.org/vuls/id/945060>

     * US-CERT Vulnerability Note VU#146284 -
       <http://www.kb.cert.org/vuls/id/146284>

     * CVE-2006-0027 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0027>

     * CVE-2006-0024 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0024>

     * CVE-2005-2628 -
       <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2628>

     * Microsoft Update - <https://update.microsoft.com/microsoftupdate>


 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA06-129A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <cert@cert.org> with "TA06-129A Feedback VU#303452" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2006 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   May 9, 2006: Initial release


    
    

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRGDvB30pj593lg50AQJkAQf9FqFX8S29GmV1pKfRCfkEY9ooi/ygyeyu
l+z2OpoJsu4BHhYbXahssZLutNh0UtpC2Qv17sgHP2xg2sIokqgqkdMH1WQn4kAw
x6RWPlI7hraIg/tY1lSZayZris4XMuDzNiqfpa/gN7oOSOtnIZ6Ky5+h5nIk+xxk
Q50BdlEHmw5e62LyW7qnBAoHuHzEQq/xS52DtTat+aigRYePq3SX2f8S4BpZyKzq
kQKN7kn2keseziuKCMEMNIH0bUunUr6M2kRsBPIBUrAi03Fmgx2Qfy7yMHRV/0Gg
A2jjB48O4m+fuHHQSVSP2gCtSbe9ChiWJ8Db1nY1pnsQ42fZvqQekg==
=nxe/
-----END PGP SIGNATURE-----
    

- 漏洞信息

23908
Macromedia Flash Player swf Processing Multiple Unspecified Code Execution
Remote / Network Access Denial of Service
Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

Flash Player contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when the victim loads a malicious SWF file. It is possible that the flaw may allow an attacker to take control of the affected system resulting in a loss of confidentiality, integrity, and/or availability.

- 时间线

2006-03-15 Unknow
Unknow 2006-11-15

- 解决方案

Upgrade to version 8.0.24.0 or 7.0.63.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Macromedia Flash Multiple Unspecified Security Vulnerabilities
Unknown 17106
Yes No
2006-03-14 12:00:00 2007-12-18 08:04:00
The vendor credits Microsoft in the discovery of these issues.

- 受影响的程序版本

S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
Opera Software Opera Web Browser 8.51
Opera Software Opera Web Browser 8.50
Opera Software Opera Web Browser 8.0 2
Opera Software Opera Web Browser 8.0 1
Opera Software Opera Web Browser 8.0
Opera Software Opera Web Browser 8.53
Opera Software Opera Web Browser 8.52
Microsoft Windows XP Tablet PC Edition SP2
Microsoft Windows XP Tablet PC Edition SP1
Microsoft Windows XP Tablet PC Edition
Microsoft Windows XP Professional x64 Edition
Microsoft Windows XP Professional SP2
Microsoft Windows XP Professional SP1
Microsoft Windows XP Professional
Microsoft Windows XP Media Center Edition SP2
Microsoft Windows XP Media Center Edition SP1
Microsoft Windows XP Media Center Edition
Microsoft Windows XP Home SP2
Microsoft Windows XP Home SP1
Microsoft Windows XP Home
Microsoft Windows XP 64-bit Edition Version 2003 SP1
Microsoft Windows XP 64-bit Edition Version 2003
Microsoft Windows XP 64-bit Edition SP1
Microsoft Windows XP 64-bit Edition
Microsoft Windows XP 0
Microsoft Windows ME
Microsoft Windows 98SE
Microsoft Windows 98
Macromedia Shockwave 8.5.1 r106
Macromedia Shockwave 8.5.1 r105
Macromedia Shockwave 8.0
- Apple Mac OS 9 9.0
- Conectiva Linux 6.0
- Debian Linux 2.2
- Mandriva Linux Mandrake 7.2
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
- Microsoft Windows 95 SR2
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP2
- Microsoft Windows NT Enterprise Server 4.0 SP1
- Microsoft Windows NT Enterprise Server 4.0
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP2
- Microsoft Windows NT Server 4.0 SP1
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
- RedHat Linux 6.0
- S.u.S.E. Linux 7.0
- Slackware Linux 7.1
- Sun Solaris 7.0
- Sun Solaris 2.6
Macromedia Shockwave 6.0
Macromedia Shockwave 5.0
Macromedia Shockwave 4.0
Macromedia Shockwave 3.0
Macromedia Shockwave 2.0
Macromedia Shockwave 1.0
Macromedia Shockwave 10.1.0.11
Macromedia Flex 1.5
Macromedia Flash MX 2004
Macromedia Flash 8.0.22 .0
Macromedia Flash 7.0.61 .0
Macromedia Flash 7.0.60 .0
Macromedia Flash 7.0.25 .0
Macromedia Flash 7.0.19 .0
Macromedia Flash 7.0 r19
Macromedia Flash 6.0.79 .0
Macromedia Flash 6.0.65 .0
Macromedia Flash 6.0.47 .0
Macromedia Flash 6.0.40 .0
Macromedia Flash 6.0.29 .0
Macromedia Flash 6.0
Macromedia Flash 5.0 r50
Macromedia Flash 5.0
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server SP2
- Microsoft Windows 2000 Server SP1
- Microsoft Windows 2000 Server
- Microsoft Windows 95 SR2
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows ME
- Microsoft Windows NT Enterprise Server 4.0 SP6a
- Microsoft Windows NT Enterprise Server 4.0 SP6
- Microsoft Windows NT Enterprise Server 4.0 SP5
- Microsoft Windows NT Enterprise Server 4.0 SP4
- Microsoft Windows NT Enterprise Server 4.0 SP3
- Microsoft Windows NT Enterprise Server 4.0 SP2
- Microsoft Windows NT Enterprise Server 4.0 SP1
- Microsoft Windows NT Enterprise Server 4.0
- Microsoft Windows NT Server 4.0 SP6a
- Microsoft Windows NT Server 4.0 SP6
- Microsoft Windows NT Server 4.0 SP5
- Microsoft Windows NT Server 4.0 SP4
- Microsoft Windows NT Server 4.0 SP3
- Microsoft Windows NT Server 4.0 SP2
- Microsoft Windows NT Server 4.0 SP1
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional
Macromedia Flash 4.0 r12
Macromedia Breeze Meeting Add-In 0
Gentoo Linux
Apple Mac OS X Server 10.5.1
Apple Mac OS X Server 10.4.11
Apple Mac OS X Server 10.4.10
Apple Mac OS X Server 10.4.9
Apple Mac OS X Server 10.4.8
Apple Mac OS X Server 10.4.7
Apple Mac OS X Server 10.4.6
Apple Mac OS X Server 10.4.5
Apple Mac OS X Server 10.4.4
Apple Mac OS X Server 10.4.3
Apple Mac OS X Server 10.4.2
Apple Mac OS X Server 10.4.1
Apple Mac OS X Server 10.4
Apple Mac OS X Server 10.5
Apple Mac OS X 10.5.1
Apple Mac OS X 10.4.11
Apple Mac OS X 10.4.10
Apple Mac OS X 10.4.9
Apple Mac OS X 10.4.8
Apple Mac OS X 10.4.7
Apple Mac OS X 10.4.6
Apple Mac OS X 10.4.5
Apple Mac OS X 10.4.4
Apple Mac OS X 10.4.3
Apple Mac OS X 10.4.2
Apple Mac OS X 10.4.1
Apple Mac OS X 10.4
Apple Mac OS X 10.5
Opera Software Opera Web Browser 8.54
Macromedia Flex 8.0.24 .0
Macromedia Flash MX 2004 7.0.63 .0
Macromedia Flash 8.0.24 .0
Macromedia Flash 7.0.63 .0
Macromedia Breeze Meeting Add-In 7.0.55 .331
Macromedia Breeze Meeting Add-In 7.0.55 .118

- 不受影响的程序版本

Opera Software Opera Web Browser 8.54
Macromedia Flex 8.0.24 .0
Macromedia Flash MX 2004 7.0.63 .0
Macromedia Flash 8.0.24 .0
Macromedia Flash 7.0.63 .0
Macromedia Breeze Meeting Add-In 7.0.55 .331
Macromedia Breeze Meeting Add-In 7.0.55 .118

- 漏洞讨论

The Macromedia Flash plug-in is susceptible to multiple unspecified vulnerabilities.

An attacker can potentially exploit these vulnerabilities to execute arbitrary code. The most likely vector of attack is through a malicious SWF file that has been designed to trigger the vulnerability and has been placed on a website. A denial-of-service condition may also occur.

Versions of the Flash Player prior to 7.0.63.0 and 8.0.24.0 are vulnerable to these issues.

- 漏洞利用


Currently we are not aware of any exploits for these issues. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com

- 解决方案

Adobe has issued advisory APSB06-03 along with fixes to address these issues.

Please see the referenced advisories for further information.


Microsoft Windows XP Media Center Edition SP2
  • Microsoft Security Update for Flash Player (KB913433)
    downloads


Microsoft Windows XP Tablet PC Edition SP1
  • Microsoft Security Update for Flash Player (KB913433)
    downloads


Microsoft Windows XP Media Center Edition SP1
  • Microsoft Security Update for Flash Player (KB913433)
    downloads


Microsoft Windows XP Tablet PC Edition SP2
  • Microsoft Security Update for Flash Player (KB913433)
    downloads


Opera Software Opera Web Browser 8.52

Opera Software Opera Web Browser 8.53

Microsoft Windows XP Home SP2
  • Microsoft Security Update for Flash Player (KB913433)
    downloads


Apple Mac OS X 10.4.11

Apple Mac OS X Server 10.4.11

Apple Mac OS X 10.5.1

Apple Mac OS X Server 10.5.1

Macromedia Flash 7.0.25 .0

Opera Software Opera Web Browser 8.0 2

Opera Software Opera Web Browser 8.0 1

Opera Software Opera Web Browser 8.50

Opera Software Opera Web Browser 8.51

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站