Full Disclosure mailing list archives
[ GLSA 200708-01 ] Macromedia Flash Player: Remote arbitrary code execution
From: Raphael Marichez <falco () gentoo org>
Date: Wed, 8 Aug 2007 22:50:47 +0200
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200708-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Macromedia Flash Player: Remote arbitrary code execution
Date: August 08, 2007
Bugs: #185141
ID: 200708-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been discovered in Macromedia Flash
Player, allowing for the remote execution of arbitrary code.
Background
==========
The Macromedia Flash Player is a renderer for the popular SWF file type
which is commonly used to provide interactive websites, digital
experiences and mobile content.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-www/netscape-flash < 9.0.48.0 >= 9.0.48.0
Description
===========
Mark Hills discovered some errors when interacting with a browser for
keystrokes handling (CVE-2007-2022). Stefano Di Paola and Giorgio Fedon
from Minded Security discovered a boundary error when processing FLV
files (CVE-2007-3456). An input validation error when processing HTTP
referrers has also been reported (CVE-2007-3457).
Impact
======
A remote attacker could entice a user to open a specially crafted file,
possibly leading to the execution of arbitrary code with the privileges
of the user running the Macromedia Flash Player, or sensitive data
access.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Macromedia Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-www/netscape-flash-9.0.48.0"
References
==========
[ 1 ] CVE-2007-2022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2022
[ 2 ] CVE-2007-3456
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456
[ 3 ] CVE-2007-3457
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3457
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200708-01.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.
License
=======
Copyright 2007 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Attachment:
_bin
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- [ GLSA 200708-01 ] Macromedia Flash Player: Remote arbitrary code execution Raphael Marichez (Aug 08)
