| Adobe Flash Player Multiple Vulnerabilities
|
|
|
|
| Secunia Advisory: |
SA28161 |
|
| Release Date: |
2007-12-19 |
| Last Update: |
2007-12-25 |
|
| Critical: |

Highly critical |
| Impact: |
Unknown
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Privilege escalation
DoS
System access
|
| Where: |
From remote
|
| Solution Status: |
Vendor Patch |
|
| Software: |
Adobe Flash
CS3
Adobe Flash
Player 9.x
Adobe Flex 2.x
Macromedia Flash
8.x
Macromedia Flash
Player 7.x
Macromedia Flash
Player 8.x
|
|
| CVE reference: |
CVE-2007-4324
(Secunia mirror)
CVE-2007-4768
(Secunia mirror)
CVE-2007-5275
(Secunia mirror)
CVE-2007-5476
(Secunia mirror)
CVE-2007-6242
(Secunia mirror)
CVE-2007-6243
(Secunia mirror)
CVE-2007-6244
(Secunia mirror)
CVE-2007-6245
(Secunia mirror)
CVE-2007-6246
(Secunia mirror)
|
|
|
Want to know the next time
vulnerabilities are fixed in this product?
- Companies
can be alerted via email and SMS! |
|
|
Description:
Some
vulnerabilities have been reported in Adobe Flash Player, where one
vulnerability has an unknown impact and others can be exploited by
malicious, local users to gain escalated privileges and by malicious
people to bypass certain security restrictions, conduct cross-site
scripting and HTTP request splitting attacks, disclose sensitive
information, cause a Denial of Service (DoS), or to potentially
compromise a user's system.
1) An error when parsing specially crafted regular expressions can be
exploited to cause a heap-based buffer overflow.
For more information see vulnerability #7 in:
SA27543
2) An error exists in the processing of SWF embedded JPG images. This
can be exploited to corrupt the heap via specially crafted X and Y
densities specified in the JPG header.
3) An error exists when pinning a hostname to an IP address. This can
be exploited to conduct DNS rebinding attacks via allow-access-from
elements in cross-domain-policy XML documents.
4) An error exists in the enforcing of cross-domain policy files. This
can be exploited to bypass certain security restrictions on web servers
hosting cross-domain policy files.
5) Input passed to unspecified parameters when handling the
"asfunction:" protocol is not properly sanitised before being returned
to the user. This can be exploited to inject arbitrary HTML and script
code in a user's browser session in context of an affected site.
The vulnerability does not affect Flash Player 7.
6) An error exists within the processing of the "navigateToURL"
function. This can be exploited to execute arbitrary script code in the
security context of another domain via a specially crafted
"_javascript_:" URI.
The vulnerability only affects the Flash Player ActiveX Control for
Internet Explorer.
7) An unspecified error can be exploited to modify HTTP headers and
conduct HTTP request splitting attacks.
8) An error within the implementation of the Socket or XMLSocket
ActionScript classes can be exploited to determine if a port on a
remote host is opened or closed.
9) An error within the setting of memory permissions in Adobe Flash
Player for Linux can be exploited by malicious, local users to gain
escalated privileges.
10) An unspecified error exists in Adobe Flash Player and Opera on Mac
OS X.
For more information see vulnerability #3 in:
SA27277
The vulnerabilities are reported in versions prior to 9.0.115.0.
Do you have this product installed on your home computer? Scan using
the free Personal Software Inspector
or Online Software
Inspector. Check if a vulnerable version is installed on computers
in your corporate network, scan using the Network Software
Inspector.
Solution:
Update to version 9.0.115.0.
Flash Player 9.0.48.0 and earlier for Windows, Mac, and Linux:
http://www.stage.adobe.com/go/getflash
Flash Player 9.0.48.0 and earlier - network distribution:
http://www.stage.adobe.com/licensing/distribution
Flash CS3 Professional:
http://www.adobe.com/support/flash/downloads.html
Flex 2.0:
http://www.stage.adobe.com/support/flashplayer/downloads.html#fp9
NOTE: This is reportedly the final security bulletin that Adobe will
supply for users of Adobe Flash Player 7 (formerly Macromedia Flash
Player 7).
Provided and/or discovered by:
1) The vendor credits Tavis Ormandy and Will Drewry of the Google
Security Team.
2) Aaron Portnoy of TippingPoint DVLabs.
3) The vendor credits Dan Boneh, Adam Barth, Andrew Bortz, Collin
Jackson, and Weidong Shao of Stanford University.
4, 7) Toshiharu Sugiyama of UBsecure, Inc. and JPCERT/CC.
5) The vendor credits Rich Cannings of the Google Security Team.
6) Collin Jackson and Adam Barth of Stanford University.
8) David Neu
9) The vendor credits Jesse Michael and Thomas Biege of SUSE.
10) The vendor credits Opera.
Changelog:
2007-12-20: Updated advisory with additional information. Added link to
US-CERT. Updated "Original Advisory" section.
2007-12-25: Updated credits and "Original Advisory" sections.
Original Advisory:
Adobe:
http://www.adobe.com/support/security/bulletins/apsb07-20.html
TippingPoint DVLabs:
http://dvlabs.tippingpoint.com/advisory/TPTI-07-21
JVN:
http://jvn.jp/jp/JVN%2345675516/index.html
http://jvn.jp/jp/JVN%2350876069/index.html
Stanford:
http://crypto.stanford.edu/advisories/CVE-2007-6244/
David Neu:
http://scan.flashsec.org/
Other References:
SA27543:
http://secunia.com/advisories/27543/
SA27277:
http://secunia.com/advisories/27277/
US-CERT VU#758769:
http://www.kb.cert.org/vuls/id/758769
|
|
|
|
Please note: The information that this
Secunia Advisory is based on comes from a third party unless stated
otherwise.
Secunia collects, validates, and verifies all vulnerability reports
issued by security research groups, vendors, and others. |
|
--
id: luoluo
mail: [EMAIL PROTECTED]
team: http://www.ph4nt0m.org
--~--~---------~--~----~------------~-------~--~----~
要向邮件组发送邮件,请发到 [email protected]
要退订此邮件,请发邮件至 [EMAIL PROTECTED] -~----------~----~----~----~------~----~------~--~---
|
- [Ph4nt0m] [zz]Adobe Flash Player Multiple Vulnerabilities luoluo
-