The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Adobe Flash Player Multiple Vulnerabilities

Secunia ID



CVE-2013-0504, CVE-2013-0643, CVE-2013-0648

Release Date

27 Feb 2013


Extremely Critical

Solution Status

Vendor Patch


Adobe Flash Player 11.x


From remote

System access

This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Security Bypass

This covers vulnerabilities or security issues where malicious users or people can bypass certain security mechanisms of the application.

The actual impact varies significantly depending on the design and purpose of the affected application.


Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

1) An unspecified error when handling permissions of the Flash Player Firefox sandbox can be exploited to bypass the sandbox restrictions.

2) An unspecified error exists within the ExternalInterface ActionScript feature. No further information is currently available.

NOTE: Vulnerabilities #1 and #2 are currently being actively exploited in targeted attacks designed for the Firefox browser.

3) An error within a Flash Player broker service can be exploited to cause a buffer overflow.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in the following products:
* Adobe Flash Player 11.6.602.168 and earlier versions for Windows
* Adobe Flash Player 11.6.602.167 and earlier versions for Macintosh
* Adobe Flash Player and earlier versions for Linux


Update to a fixed version.

Adobe Flash Player for Windows and Macintosh:
Update to version 11.6.602.171.

Adobe Flash Player for Linux:
Update to version

Reported by

1, 2) Reported as 0-day.
3) The vendor credits Mark Yason, IBM X-Force.

Original Advisory