CVE-2018-4878

KEV
Published: Feb 06, 2018 Last Modified: Nov 18, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,8
Attack Vector: local
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 7,5
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: partial
Availability: partial

Description

AI Translation Available

A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9313
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

416

Use After Free

Stable
Common Consequences
Security Scopes Affected:
Integrity Availability Confidentiality
Potential Impacts:
Modify Memory Dos: Crash, Exit, Or Restart Execute Unauthorized Code Or Commands
Applicable Platforms
Languages: C, C++, Memory-Unsafe
View CWE Details
Exploit

Adobe Flash < 28.0.0.161 - Use-After-Free

Adobe Flash < 28.0.0.161 - Use-After-Free

View Exploit Code →
Exploit

Flash ActiveX 28.0.0.137 - Code Execution (1)

Flash ActiveX 28.0.0.137 - Code Execution (1)

View Exploit Code →
Exploit

Flash ActiveX 28.0.0.137 - Code Execution (2)

Flash ActiveX 28.0.0.137 - Code Execution (2)

View Exploit Code →
Operating System

Enterprise Linux Server by Redhat

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Flash Player by Adobe

Version Range Affected
To 28.0.0.161 (exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Flash Player by Adobe

Version Range Affected
To 28.0.0.161 (exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Flash Player by Adobe

Version Range Affected
To 28.0.0.161 (exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer_11:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Workstation by Redhat

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Flash Player by Adobe

Version Range Affected
To 28.0.0.161 (exclusive)
cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Enterprise Linux Desktop by Redhat

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/cisagov/vulnrichment/issues/196
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018…
http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
https://access.redhat.com/errata/RHSA-2018:0285
https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-mass…
https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flas…
https://github.com/vysec/CVE-2018-4878
https://helpx.adobe.com/security/products/flash-player/apsb18-03.html
https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-pr…
https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/
https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reapp…
https://www.exploit-db.com/exploits/44412/
https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-z…
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/…
http://www.securityfocus.com/bid/102893
http://www.securitytracker.com/id/1040318
http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
https://access.redhat.com/errata/RHSA-2018:0285
https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-mass…
https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flas…
https://github.com/vysec/CVE-2018-4878
https://helpx.adobe.com/security/products/flash-player/apsb18-03.html
https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-pr…
https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/
https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reapp…
https://www.exploit-db.com/exploits/44412/
https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-z…
https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/…
http://www.securityfocus.com/bid/102893
http://www.securitytracker.com/id/1040318