Lucene search

K
gentooGentoo FoundationGLSA-200708-01
HistoryAug 08, 2007 - 12:00 a.m.

Macromedia Flash Player: Remote arbitrary code execution

2007-08-0800:00:00
Gentoo Foundation
security.gentoo.org
17

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.967

Percentile

99.7%

Background

The Macromedia Flash Player is a renderer for the popular SWF file type which is commonly used to provide interactive websites, digital experiences and mobile content.

Description

Mark Hills discovered some errors when interacting with a browser for keystrokes handling (CVE-2007-2022). Stefano Di Paola and Giorgio Fedon from Minded Security discovered a boundary error when processing FLV files (CVE-2007-3456). An input validation error when processing HTTP referrers has also been reported (CVE-2007-3457).

Impact

A remote attacker could entice a user to open a specially crafted file, possibly leading to the execution of arbitrary code with the privileges of the user running the Macromedia Flash Player, or sensitive data access.

Workaround

There is no known workaround at this time.

Resolution

All Macromedia Flash Player users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-9.0.48.0"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-plugins/adobe-flash< 9.0.48.0UNKNOWN

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.967

Percentile

99.7%