Jump to content

Adobe Flash Player Multiple Vulnerabilities


Recommended Posts

From: Secunia

secunia.com/advisories/28161/

 

Rating: Highly critical

 

Description:

Some vulnerabilities have been reported in Adobe Flash Player, where one vulnerability has an unknown impact and others can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user's system.

 

1) An error when parsing specially crafted regular expressions can be exploited to cause a heap-based buffer overflow.

 

2) An unspecified error in the parsing of SWF files can potentially be exploited to execute arbitrary code.

 

3) An error exists when pinning a hostname to an IP address. This can be exploited to conduct DNS rebinding attacks via allow-access-from elements in cross-domain-policy XML documents.

 

4) An error exists in the enforcing of cross-domain policy files. This can be exploited to bypass certain security restrictions on web servers hosting cross-domain policy files.

 

5) Input passed to unspecified parameters when handling the "asfunction:" protocol is not properly sanitised before being returned to the user. This can be exploited to inject arbitrary HTML and script code in a user's browser session in context of an affected site.

 

The vulnerability does not affect Flash Player 7.

 

6) Input passed to unspecified parameters when calling the "navigateToURL" function is not properly sanitised before being returned to the user. This can be exploited to inject arbitrary HTML and script code in a user's browser session in context of an affected site.

 

The vulnerability only affects the Flash Player ActiveX Control for Internet Explorer.

 

7) An unspecified error can be exploited to modify HTTP headers and conduct HTTP request splitting attacks.

 

8) An error within the implementation of the Socket or XMLSocket ActionScript classes can be exploited to determine if a port on a remote host is opened or closed.

 

9) An error within the setting of memory permissions in Adobe Flash Player for Linux can be exploited by malicious, local users to gain escalated privileges.

 

10) An unspecified error exists in Adobe Flash Player and Opera on Mac OS X.

 

The vulnerabilities are reported in versions prior to 9.0.115.0.

 

 

Solution:

Update to version 9.0.115.0.

 

Flash Player 9.0.48.0 and earlier for Windows, Mac, and Linux:

stage.adobe.com/go/getflash

 

Flash Player 9.0.48.0 and earlier - network distribution:

stage.adobe.com/licensing/distribution

 

Flash CS3 Professional:

adobe.com/support/flash/downloads.html

 

Flex 2.0:

adobe.com/support/flashplayer/downloads.html#fp9

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...