what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 28161

Secunia Security Advisory 28161
Posted Dec 20, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Adobe Flash Player, where one vulnerability has an unknown impact and others can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user's system.

tags | advisory, web, denial of service, local, vulnerability, xss
SHA-256 | b858d7e7d3afe4bcf838c5e604b9b6b1fd44e9bd9afe5dbecc767d3f05b75bb4

Secunia Security Advisory 28161

Change Mirror Download


----------------------------------------------------------------------

2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published

How do you know which Secunia advisories are important to you?

The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.

Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

----------------------------------------------------------------------

TITLE:
Adobe Flash Player Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA28161

VERIFY ADVISORY:
http://secunia.com/advisories/28161/

CRITICAL:
Highly critical

IMPACT:
Unknown, Security Bypass, Cross Site Scripting, Manipulation of data,
Exposure of sensitive information, Privilege escalation, DoS, System
access

WHERE:
>From remote

SOFTWARE:
Adobe Flash Player 9.x
http://secunia.com/product/11901/
Adobe Flash CS3
http://secunia.com/product/14231/
Adobe Flex 2.x
http://secunia.com/product/14760/
Macromedia Flash 8.x
http://secunia.com/product/7024/
Macromedia Flash Player 7.x
http://secunia.com/product/2634/
Macromedia Flash Player 8.x
http://secunia.com/product/6153/

DESCRIPTION:
Some vulnerabilities have been reported in Adobe Flash Player, where
one vulnerability has an unknown impact and others can be exploited
by malicious, local users to gain escalated privileges and by
malicious people to bypass certain security restrictions, conduct
cross-site scripting and HTTP request splitting attacks, disclose
sensitive information, cause a Denial of Service (DoS), or to
potentially compromise a user's system.

1) An error when parsing specially crafted regular expressions can be
exploited to cause a heap-based buffer overflow.

For more information see vulnerability #7 in:
SA27543

2) An unspecified error in the parsing of SWF files can potentially
be exploited to execute arbitrary code.

3) An error exists when pinning a hostname to an IP address. This can
be exploited to conduct DNS rebinding attacks via allow-access-from
elements in cross-domain-policy XML documents.

4) An error exists in the enforcing of cross-domain policy files.
This can be exploited to bypass certain security restrictions on web
servers hosting cross-domain policy files.

5) Input passed to unspecified parameters when handling the
"asfunction:" protocol is not properly sanitised before being
returned to the user. This can be exploited to inject arbitrary HTML
and script code in a user's browser session in context of an affected
site.

The vulnerability does not affect Flash Player 7.

6) Input passed to unspecified parameters when calling the
"navigateToURL" function is not properly sanitised before being
returned to the user. This can be exploited to inject arbitrary HTML
and script code in a user's browser session in context of an affected
site.

The vulnerability only affects the Flash Player ActiveX Control for
Internet Explorer.

7) An unspecified error can be exploited to modify HTTP headers and
conduct HTTP request splitting attacks.

8) An error within the implementation of the Socket or XMLSocket
ActionScript classes can be exploited to determine if a port on a
remote host is opened or closed.

9) An error within the setting of memory permissions in Adobe Flash
Player for Linux can be exploited by malicious, local users to gain
escalated privileges.

10) An unspecified error exists in Adobe Flash Player and Opera on
Mac OS X.

For more information see vulnerability #3 in:
SA27277

The vulnerabilities are reported in versions prior to 9.0.115.0.

SOLUTION:
Update to version 9.0.115.0.

Flash Player 9.0.48.0 and earlier for Windows, Mac, and Linux:
http://www.stage.adobe.com/go/getflash

Flash Player 9.0.48.0 and earlier - network distribution:
http://www.stage.adobe.com/licensing/distribution

Flash CS3 Professional:
http://www.adobe.com/support/flash/downloads.html

Flex 2.0:
http://www.stage.adobe.com/support/flashplayer/downloads.html#fp9

NOTE: This is reportedly the final security bulletin that Adobe will
supply for users of Adobe Flash Player 7 (formerly Macromedia Flash
Player 7).

PROVIDED AND/OR DISCOVERED BY:
1) The vendor credits Tavis Ormandy and Will Drewry of the Google
Security Team.
2) The vendor credits Aaron Portnoy of TippingPoint DVLabs.
3) The vendor credits Dan Boneh, Adam Barth, Andrew Bortz, Collin
Jackson, and Weidong Shao of Stanford University.
4, 7) The vendor credits Toshiharu Sugiyama of UBsecure, Inc. and
JPCERT/CC.
5) The vendor credits Rich Cannings of the Google Security Team.
6) The vendor credits Collin Jackson and Adam Barth of Stanford
University.
9) The vendor credits Jesse Michael and Thomas Biege of SUSE.
10) The vendor credits Opera.

ORIGINAL ADVISORY:
http://www.adobe.com/support/security/bulletins/apsb07-20.html

OTHER REFERENCES:
SA27543:
http://secunia.com/advisories/27543/

SA27277:
http://secunia.com/advisories/27277/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close