what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

CT12-09-2006.txt

CT12-09-2006.txt
Posted Sep 13, 2006
Authored by Stuart Pearson

Adobe Flash Player versions 8.0.24.0 and below, Adobe Flash Professional 8, Flash Basic, Adobe Flash MX 2004, and Adobe Flex 1.5 suffer from a remote code execution vulnerability through the simple invocation of a maliciously constructed web page.

tags | advisory, remote, web, code execution
SHA-256 | c2e62732e89a3add14dd48ce53da3fbb131196dafa28c9ee09bbf5a3edb3beb8

CT12-09-2006.txt

Change Mirror Download
Computer Terrorism  (UK) :: Incident Response Centre

www.computerterrorism.com

Security Advisory: CT12-09-2006


============================================================
Adobe/Macromedia Flash Player - Remote Code Execution
============================================================

Advisory Date: 12th, September 2006

Severity: Critical
Impact: Remote System Access
Solution Status: Vendor Patch

CVE Reference: CVE-2006-3311



Affected Software
=================

Adobe Flash Player 8.0.24.0 and earlier versions
Adobe Flash Professional 8, Flash Basic
Adobe Flash MX 2004
Adobe Flex 1.5

Note: All OS Platforms are vulnerable


1. OVERVIEW
===========

Adobe/Macromedia Flash Player is the world's most ubiquitous Browser plug-in
for Microsoft, Mozilla and Apple technologies. The plug-in claims to facilitate
high-impact web interfaces and interactive online advertising for circa 98% of
desktops globally.

Unfortunately, it transpires that Adobe Flash Player is prone to a remote
arbitrary code execution vulnerability, that allows an attacker to gain
control of a target system through the simple invocation of a maliciously
constructed web page.


2. TECHNICAL NARRATIVE
======================

The vulnerability originates out of Flash's failure to sufficiently handle
large dynamically generated strings at run time. As a result, it is possible
(using rudimentary Action Script) to create a .swf movie in such a way that
when processed by the Plug-in, will overwrite system memory at an explicit
location.

More specifically, the aforementioned location can (with a certain degree of
accuracy) be attacker controlled via the direct manipulation of the overall
length of the generated string.

The net result is that of a partially controllable condition, which opens the
door to a multitude of differing exploitation vectors, including but not
limited to heap/stack overwrites, and/or 3rd party race conditions.


3. EXPLOITATION
===============

Computer Terrorism (UK) can confirm the un-disclosed production of a reliable
multi-platform & multi-browser Web based Proof-Of-Concept (PoC). Such an
exploit could be used in a web-based attack scenario, where unsuspecting
users are lured to a maliciously constructed website.

Users that have not already done so are strongly advised to upgrade to the latest
version of Flash Player or apply the appropriate fix for their particular version.


4. VENDOR RESPONSE
==================

The vendor security bulletin and corresponding patches are available at the
following location:

http://www.adobe.com/go/apsb06-11/


5. DISCLOSURE ANALYSIS
======================

12/05/2006 Preliminary Vendor notification.
18/05/2006 Vulnerability confirmed in pre-release Flash 9, and earlier versions
28/06/2006 Flash Player 9 released (Fixed)
31/07/2006 Public Disclosure Deferred by Vendor.
12/09/2006 Coordinated public release.

Total Time to Fix: 4 months (123 days)


6. CREDIT
=========

The vulnerability was discovered by Stuart Pearson of Computer Terrorism (UK) Ltd




===================
About Computer Terrorism
===================

Computer Terrorism (UK) Ltd is a global provider of Digital Risk Intelligence services.
Our unique approach to vulnerability risk assessment and mitigation has helped protect
some of the worlds most at risk organisations.

Headquartered in London, Computer Terrorism has representation throughout Europe &
North America and can be reached at +44 (0) 870 250 9866 or email:-

sales [at] computerterrorism.com

To learn more about our services and to register for a FREE comprehensive website
penetration test, visit: http:/www.computerterrorism.com


Computer Terrorism (UK) :: Protection for a vulnerable world.



Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close