adobe flash-player CVE-2014-0497 vulnerability in Adobe and Other Products
Published on February 5, 2014

product logo product logo product logo product logo
Integer underflow in Adobe Flash Player before 11.7.700.261 and 11.8.x through 12.0.x before 12.0.0.44 on Windows and Mac OS X, and before 11.2.202.336 on Linux, allows remote attackers to execute arbitrary code via unspecified vectors.

Vendor Advisory Vendor Advisory NVD

Known Exploited Vulnerability

This Adobe Flash Player Integer Underflow Vulnerablity vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Adobe Flash Player contains an integer underflow vulnerability that allows a remote attacker to execute arbitrary code.

The following remediation steps are recommended / required by October 8, 2024: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

Vulnerability Analysis

CVE-2014-0497 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

What is an Integer underflow Vulnerability?

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. This can happen in signed and unsigned cases.

CVE-2014-0497 has been classified to as an Integer underflow vulnerability or weakness.


Products Associated with CVE-2014-0497

You can be notified by stack.watch whenever vulnerabilities like CVE-2014-0497 are published in these products:

 
 
 
 
 
 
 
 

What versions are vulnerable to CVE-2014-0497?

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.

Each of the following must match for the vulnerability to exist.