Lucene search

K
nessusThis script is Copyright (C) 2008-2022 Tenable Network Security, Inc.ADOBE_AIR_APSB08-23.NASL
HistoryNov 18, 2008 - 12:00 a.m.

Adobe AIR < 1.5 Multiple Vulnerabilities (APSB08-23)

2008-11-1800:00:00
This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.
www.tenable.com
44

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.614

Percentile

97.8%

According to its version number, an instance of Adobe AIR on the remote Windows host is 1.1 or earlier. Such versions are potentially affected by several vulnerabilities (APSB08-23 / APSB08-22 / APSB08-20 / APSB08-18):

  • A potential port-scanning issue. (CVE-2007-4324)

  • Possible privilege escalation attacks against web servers hosting Flash content and cross-domain policy files. (CVE-2007-6243)

  • Potential Clipboard attacks. (CVE-2008-3873)

  • FileReference upload and download APIs that don’t require user interaction. (CVE-2008-4401)

  • A potential cross-site scripting vulnerability. (CVE-2008-4818)

  • A potential issue that could be leveraged to conduct a DNS rebinding attack. (CVE-2008-4819)

  • An information disclosure issue affecting only the ActiveX control. (CVE-2008-4820)

  • An information disclosure issue involving interpretation of the ‘jar:’ protocol and affecting only the plugin for Mozilla browsers. (CVE-2008-4821)

  • An issue with policy file interpretation could potentially lead to bypass of a non-root domain policy. (CVE-2008-4822)

  • A potential HTML injection issue involving an ActionScript attribute. (CVE-2008-4823)

  • Multiple input validation errors could potentially lead to execution of arbitrary code. (CVE-2008-4824)

  • An Adobe AIR application that loads data from an untrusted source could allow an attacker to execute untrusted JavaScript with elevated privileges. (CVE-2008-5108)

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(34815);
  script_version("1.20");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id(
    "CVE-2007-4324",
    "CVE-2007-6243",
    "CVE-2008-3873",
    "CVE-2008-4401",
    "CVE-2008-4818",
    "CVE-2008-4819",
    "CVE-2008-4820",
    "CVE-2008-4821",
    "CVE-2008-4822",
    "CVE-2008-4823",
    "CVE-2008-4824",
    "CVE-2008-5108"
  );
  script_bugtraq_id(
    25260,
    26966,
    31117,
    32129,
    32334
  );
  script_xref(name:"SECUNIA", value:"32772");

  script_name(english:"Adobe AIR < 1.5 Multiple Vulnerabilities (APSB08-23)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a runtime environment that is
affected by multiple issues.");
  script_set_attribute(attribute:"description", value:
"According to its version number, an instance of Adobe AIR on the
remote Windows host is 1.1 or earlier.  Such versions are potentially
affected by several vulnerabilities (APSB08-23 / APSB08-22 / 
APSB08-20 / APSB08-18):

  - A potential port-scanning issue. (CVE-2007-4324)

  - Possible privilege escalation attacks against web 
    servers hosting Flash content and cross-domain policy 
    files.  (CVE-2007-6243)

  - Potential Clipboard attacks. (CVE-2008-3873)

  - FileReference upload and download APIs that don't
    require user interaction. (CVE-2008-4401)

  - A potential cross-site scripting vulnerability. 
    (CVE-2008-4818)

  - A potential issue that could be leveraged to conduct
    a DNS rebinding attack. (CVE-2008-4819)

  - An information disclosure issue affecting only the 
    ActiveX control. (CVE-2008-4820)

  - An information disclosure issue involving interpretation
    of the 'jar:' protocol and affecting only the plugin for 
    Mozilla browsers. (CVE-2008-4821)

  - An issue with policy file interpretation could 
    potentially lead to bypass of a non-root domain policy. 
    (CVE-2008-4822)

  - A potential HTML injection issue involving an 
    ActionScript attribute. (CVE-2008-4823)

  - Multiple input validation errors could potentially lead
    to execution of arbitrary code. (CVE-2008-4824)

  - An Adobe AIR application that loads data from an 
    untrusted source could allow an attacker to execute 
    untrusted JavaScript with elevated privileges. 
    (CVE-2008-5108)");
  # https://web.archive.org/web/20090213183551/http://www.adobe.com/support/security/bulletins/apsb08-23.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0d47175e");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Adobe AIR version 1.5 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 79, 94, 200, 264);

  script_set_attribute(attribute:"patch_publication_date", value:"2008/11/17");
  script_set_attribute(attribute:"plugin_publication_date", value:"2008/11/18");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:air");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.");

  script_dependencies("adobe_air_installed.nasl");
  script_require_keys("SMB/Adobe_AIR/Version");

  exit(0);
}

#

include("global_settings.inc");


version_ui = get_kb_item("SMB/Adobe_AIR/Version_UI");
version = get_kb_item("SMB/Adobe_AIR/Version");
if (isnull(version)) exit(0);

ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
  ver[i] = int(ver[i]);

if (
  ver[0] < 1 ||
  (
    ver[0] == 1 && 
    (
      ver[1] < 5 ||
      (ver[1] == 5 && ver[2] == 0 && ver[3] < 7220)
    )
  )
)
{
  if (report_verbosity && version_ui)
  {
    report = string(
      "\n",
      "Adobe AIR ", version_ui, " is currently installed on the remote host.\n"
    );
    security_hole(port:get_kb_item("SMB/transport"), extra:report);
  }
  else security_hole(get_kb_item("SMB/transport"));
}
VendorProductVersionCPE
adobeaircpe:/a:adobe:air

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.614

Percentile

97.8%