Adobe Flash Player: Multiple Vulnerabilities
STEAM-ADVISORY NO. 2007071801 PURDUE UNIVERSITY SECURITY TEAM CIRT Wednesday July 18 14:11:00 EST 20007
**** NOTICE ****
A working exploit has been successfully tested but the code has not been publicly released yet.
Adobe Flash Player and Flash Plugin have been found to have multiple vulnerabilities which could allow an attacker to remotely execute code on a vulnerable system, obtain sensitive information via browser keystrokes, and allow cross-site request forgery. These vulnerabilities affect all users of Adobe Flash Player regardless of platform (Win, Mac, Solaris, and Linux). A new version that addresses the security issues has been released by Adobe.
* Adobe Flash Player 184.108.40.206 and earlier (Win, Mac, Solaris, Linux)
* Adobe Flash Player 220.127.116.11 and earlier (Win, Mac, Solaris, Linux)
* Adobe Flash Player 18.104.22.168 and earlier (Win, Mac, Solaris, Linux)
There are actually three vulnerabilities addressed in this update from Adobe, one of which is considered to be critical.
The most critical of the three vulnerabilities occurs when an attacker using a specially crafted SWF file creates an "input validation error" that can execute arbitrary code on the user's computer. This vulnerability could be accessed through content delivered via a web browser, email client, or any other applications that include or reference the Flash Player. This particular vulnerability has been tested and confirmed but has not been publicly released yet.
The second vulnerability in Flash Player is due to insufficient validation of the HTTP Referer headers which can allow a remote attacker to conduct a cross-site request forgery attack using a crafted SWF file.
The last vulnerability in Flash Player only affects Opera or Konqueror browsers on Linux or Solaris which can potentially leak browser keystrokes to the Flash Player applet which could allow remote attackers to obtain sensitive information through your browser.
Adobe has provided an update to Flash Player that fixes this vulnerability.
==FURTHER INFORMATION AND RESOURCES==
Adobe Upgrade Available:
Adobe Security Bulletin:
Minded Security Labs Advisory:
Common Vulnerabilities and Exposures Links:
==STEAM-CIRT CONTACT INFORMATION==
For questions concerning this advisory, please send email to:
Report computer-related abuse to steam-cirt:
Posted by Douglas Couch on July 17, 2007, in Advisory Alerts.