{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright © Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/vex/2012/cve-2012-4168.json"
      }
    ],
    "title": "flash-plugin: cross-domain information leak flaw (APSB12-19)",
    "tracking": {
      "current_release_date": "2025-11-21T12:51:13+00:00",
      "generator": {
        "date": "2025-11-21T12:51:13+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.12"
        }
      },
      "id": "CVE-2012-4168",
      "initial_release_date": "2012-08-21T00:00:00+00:00",
      "revision_history": [
        {
          "date": "2012-08-21T00:00:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-04-11T01:07:40+00:00",
          "number": "2",
          "summary": "Current version"
        },
        {
          "date": "2025-11-21T12:51:13+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
                  "product_id": "5Client-Supplementary-5.8.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
                  "product_id": "5Server-Supplementary-5.8.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:5::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                  "product_id": "6Client-Supplementary-6.3.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                  "product_id": "6Server-Supplementary-6.3.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                  "product_id": "6Workstation-Supplementary-6.3.z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux Supplementary"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "flash-plugin-0:11.2.202.238-1.el5.i386",
                "product": {
                  "name": "flash-plugin-0:11.2.202.238-1.el5.i386",
                  "product_id": "flash-plugin-0:11.2.202.238-1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.238-1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "flash-plugin-0:11.2.202.238-1.el6.i686",
                "product": {
                  "name": "flash-plugin-0:11.2.202.238-1.el6.i686",
                  "product_id": "flash-plugin-0:11.2.202.238-1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/flash-plugin@11.2.202.238-1.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "flash-plugin-0:11.2.202.238-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
          "product_id": "5Client-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386"
        },
        "product_reference": "flash-plugin-0:11.2.202.238-1.el5.i386",
        "relates_to_product_reference": "5Client-Supplementary-5.8.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "flash-plugin-0:11.2.202.238-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
          "product_id": "5Server-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386"
        },
        "product_reference": "flash-plugin-0:11.2.202.238-1.el5.i386",
        "relates_to_product_reference": "5Server-Supplementary-5.8.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "flash-plugin-0:11.2.202.238-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686"
        },
        "product_reference": "flash-plugin-0:11.2.202.238-1.el6.i686",
        "relates_to_product_reference": "6Client-Supplementary-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "flash-plugin-0:11.2.202.238-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686"
        },
        "product_reference": "flash-plugin-0:11.2.202.238-1.el6.i686",
        "relates_to_product_reference": "6Server-Supplementary-6.3.z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "flash-plugin-0:11.2.202.238-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686"
        },
        "product_reference": "flash-plugin-0:11.2.202.238-1.el6.i686",
        "relates_to_product_reference": "6Workstation-Supplementary-6.3.z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2012-4168",
      "discovery_date": "2012-08-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "850529"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.23 and 11.x before 11.4.402.265 on Windows and Mac OS X, before 10.3.183.23 and 11.x before 11.2.202.238 on Linux, before 11.1.111.16 on Android 2.x and 3.x, and before 11.1.115.17 on Android 4.x; Adobe AIR before 3.4.0.2540; and Adobe AIR SDK before 3.4.0.2540 allow remote attackers to read content from a different domain via a crafted web site.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: cross-domain information leak flaw (APSB12-19)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "5Client-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386",
          "5Server-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386",
          "6Client-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686",
          "6Server-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686",
          "6Workstation-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2012-4168"
        },
        {
          "category": "external",
          "summary": "RHBZ#850529",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850529"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4168",
          "url": "https://www.cve.org/CVERecord?id=CVE-2012-4168"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4168",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4168"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb12-19.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb12-19.html"
        }
      ],
      "release_date": "2012-08-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2012-08-23T16:26:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "5Client-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386",
            "5Server-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2012:1203"
        },
        {
          "category": "vendor_fix",
          "date": "2012-08-15T19:25:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
          "product_ids": [
            "6Client-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686",
            "6Server-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686",
            "6Workstation-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2012:1173"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "5Client-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386",
            "5Server-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386",
            "6Client-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686",
            "6Server-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686",
            "6Workstation-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate",
          "product_ids": [
            "5Client-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386",
            "5Server-Supplementary-5.8.Z:flash-plugin-0:11.2.202.238-1.el5.i386",
            "6Client-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686",
            "6Server-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686",
            "6Workstation-Supplementary-6.3.z:flash-plugin-0:11.2.202.238-1.el6.i686"
          ]
        }
      ],
      "title": "flash-plugin: cross-domain information leak flaw (APSB12-19)"
    }
  ]
}