CVE-2012-1535: Adobe Flash Player Integer Overflow Vulnerability Analysis
Vulnerabilities in Adobe Flash Player has been widely used by cyber criminals since 2006 to penetrate remote systems. During the month of August 2012 a widespread 0day was used to perform attacks by using Microsoft Word documents as the principal attack vector. This security publication explains the particulars of the CVE-2012-1535 security vulnerability in detail.
Authors: | Brian Mariani, Senior Security Auditor, High-Tech Bridge Frederic Bourla, Chief Security Specialist, High-Tech Bridge |
Vulnerabilities in Adobe Flash Player has been widely used by cyber criminals since 2006 to penetrate remote systems.
During the month of August 2012 a widespread 0day was used to perform attacks by using Microsoft Word documents as the principal attack vector.
This security publication explains the particulars of the CVE-2012-1535 security vulnerability in detail.
The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security