Adobe Flash Player Multiple Vulnerabilities Advisory Available in Danish  Advisory Available in German 

Secunia Advisory: SA28161  
Release Date: 2007-12-19
Last Update: 2007-12-25

Critical:
Highly critical
Impact: Unknown
Security Bypass
Cross Site Scripting
Manipulation of data
Exposure of sensitive information
Privilege escalation
DoS
System access
Where: From remote
Solution Status: Vendor Patch

Software: Adobe Flash CS3
Adobe Flash Player 9.x
Adobe Flex 2.x
Macromedia Flash 8.x
Macromedia Flash Player 7.x
Macromedia Flash Player 8.x

CVE reference: CVE-2007-4324 (Secunia mirror)
CVE-2007-4768 (Secunia mirror)
CVE-2007-5275 (Secunia mirror)
CVE-2007-5476 (Secunia mirror)
CVE-2007-6242 (Secunia mirror)
CVE-2007-6243 (Secunia mirror)
CVE-2007-6244 (Secunia mirror)
CVE-2007-6245 (Secunia mirror)
CVE-2007-6246 (Secunia mirror)


Want to know the next time vulnerabilities are fixed in this product?
- Companies can be alerted via email and SMS!


Description:
Some vulnerabilities have been reported in Adobe Flash Player, where one vulnerability has an unknown impact and others can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user's system.

1) An error when parsing specially crafted regular expressions can be exploited to cause a heap-based buffer overflow.

For more information see vulnerability #7 in:
SA27543

2) An error exists in the processing of SWF embedded JPG images. This can be exploited to corrupt the heap via specially crafted X and Y densities specified in the JPG header.

3) An error exists when pinning a hostname to an IP address. This can be exploited to conduct DNS rebinding attacks via allow-access-from elements in cross-domain-policy XML documents.

4) An error exists in the enforcing of cross-domain policy files. This can be exploited to bypass certain security restrictions on web servers hosting cross-domain policy files.

5) Input passed to unspecified parameters when handling the "asfunction:" protocol is not properly sanitised before being returned to the user. This can be exploited to inject arbitrary HTML and script code in a user's browser session in context of an affected site.

The vulnerability does not affect Flash Player 7.

6) An error exists within the processing of the "navigateToURL" function. This can be exploited to execute arbitrary script code in the security context of another domain via a specially crafted "_javascript_:" URI.

The vulnerability only affects the Flash Player ActiveX Control for Internet Explorer.

7) An unspecified error can be exploited to modify HTTP headers and conduct HTTP request splitting attacks.

8) An error within the implementation of the Socket or XMLSocket ActionScript classes can be exploited to determine if a port on a remote host is opened or closed.

9) An error within the setting of memory permissions in Adobe Flash Player for Linux can be exploited by malicious, local users to gain escalated privileges.

10) An unspecified error exists in Adobe Flash Player and Opera on Mac OS X.

For more information see vulnerability #3 in:
SA27277

The vulnerabilities are reported in versions prior to 9.0.115.0.

Do you have this product installed on your home computer? Scan using the free Personal Software Inspector or Online Software Inspector. Check if a vulnerable version is installed on computers in your corporate network, scan using the Network Software Inspector.

Solution:
Update to version 9.0.115.0.

Flash Player 9.0.48.0 and earlier for Windows, Mac, and Linux:
http://www.stage.adobe.com/go/getflash

Flash Player 9.0.48.0 and earlier - network distribution:
http://www.stage.adobe.com/licensing/distribution

Flash CS3 Professional:
http://www.adobe.com/support/flash/downloads.html

Flex 2.0:
http://www.stage.adobe.com/support/flashplayer/downloads.html#fp9

NOTE: This is reportedly the final security bulletin that Adobe will supply for users of Adobe Flash Player 7 (formerly Macromedia Flash Player 7).

Provided and/or discovered by:
1) The vendor credits Tavis Ormandy and Will Drewry of the Google Security Team.
2) Aaron Portnoy of TippingPoint DVLabs.
3) The vendor credits Dan Boneh, Adam Barth, Andrew Bortz, Collin Jackson, and Weidong Shao of Stanford University.
4, 7) Toshiharu Sugiyama of UBsecure, Inc. and JPCERT/CC.
5) The vendor credits Rich Cannings of the Google Security Team.
6) Collin Jackson and Adam Barth of Stanford University.
8) David Neu
9) The vendor credits Jesse Michael and Thomas Biege of SUSE.
10) The vendor credits Opera.

Changelog:
2007-12-20: Updated advisory with additional information. Added link to US-CERT. Updated "Original Advisory" section.
2007-12-25: Updated credits and "Original Advisory" sections.

Original Advisory:
Adobe:
http://www.adobe.com/support/security/bulletins/apsb07-20.html

TippingPoint DVLabs:
http://dvlabs.tippingpoint.com/advisory/TPTI-07-21

JVN:
http://jvn.jp/jp/JVN%2345675516/index.html
http://jvn.jp/jp/JVN%2350876069/index.html

Stanford:
http://crypto.stanford.edu/advisories/CVE-2007-6244/

David Neu:
http://scan.flashsec.org/

Other References:
SA27543:
http://secunia.com/advisories/27543/

SA27277:
http://secunia.com/advisories/27277/

US-CERT VU#758769:
http://www.kb.cert.org/vuls/id/758769




Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
-- 
id: luoluo
mail: [EMAIL PROTECTED]
team: http://www.ph4nt0m.org

--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---



回复