CVE-2011-0609

7.8 HIGH CISA KEV - Actively Exploited
Published: March 15, 2011 Modified: October 22, 2025

Description

Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux, and Solaris; 10.1.106.16 and earlier on Android; Adobe AIR 2.5.1 and earlier; and Authplay.dll (aka AuthPlayLib.bundle) in Adobe Reader and Acrobat 9.x through 9.4.2 and 10.x through 10.0.1 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via crafted Flash content, as demonstrated by a .swf file embedded in an Excel spreadsheet, and as exploited in the wild in March 2011.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
Source: psirt@adobe.com
Mailing List Third Party Advisory
http://secunia.com/advisories/43751
Source: psirt@adobe.com
Broken Link
http://secunia.com/advisories/43757
Source: psirt@adobe.com
Broken Link
http://secunia.com/advisories/43772
Source: psirt@adobe.com
Broken Link
http://secunia.com/advisories/43856
Source: psirt@adobe.com
Broken Link
http://securityreason.com/securityalert/8152
Source: psirt@adobe.com
Broken Link
http://www.kb.cert.org/vuls/id/192052
Source: psirt@adobe.com
Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/46860
Source: psirt@adobe.com
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025210
Source: psirt@adobe.com
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025211
Source: psirt@adobe.com
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025238
Source: psirt@adobe.com
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0655
Source: psirt@adobe.com
Broken Link
http://www.vupen.com/english/advisories/2011/0656
Source: psirt@adobe.com
Broken Link
http://www.vupen.com/english/advisories/2011/0688
Source: psirt@adobe.com
Broken Link
http://www.vupen.com/english/advisories/2011/0732
Source: psirt@adobe.com
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/66078
Source: psirt@adobe.com
Third Party Advisory VDB Entry
http://blogs.adobe.com/asset/2011/03/background-on-apsa11-01-patch-schedule.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/43751
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/43757
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/43772
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/43856
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://securityreason.com/securityalert/8152
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.adobe.com/support/security/advisories/apsa11-01.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb11-06.html
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.kb.cert.org/vuls/id/192052
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.redhat.com/support/errata/RHSA-2011-0372.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/46860
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025210
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025211
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1025238
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0655
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2011/0656
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2011/0688
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2011/0732
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/66078
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

45 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
92.1%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-06-22

Affected Vendors

suse adobe linux oracle google microsoft apple opensuse