CERTA-2005-AVI-438

Vulnerability from certfr_avis - Published: 2005-11-07 - Updated: 2005-11-28

None

Description

Une vulnérabilité a été découverte dans la gestion des variables des fichiers SWF du logiciel Macromedia Flash Player.

Cette vulnérabilité peut être exploitée afin d'exécuter du code arbitraire via un site web ou un fichier SWF malicieusement construit.

Solution

Deux solutions peuvent être envisagées :

  • Utiliser Flash player 8 (version 8.0.22.0) ;
  • mettre à jour Flash Player 7 en version 7.0.61.0 ou 7.0.60.0.

Macromedia Flash Player version 7.0.19.0 et versions inférieures.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eMacromedia Flash Player version  7.0.19.0 et versions inf\u00e9rieures.\u003c/p\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans la gestion des variables des\nfichiers SWF du logiciel Macromedia Flash Player.\n\nCette vuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e afin d\u0027ex\u00e9cuter du code\narbitraire via un site web ou un fichier SWF malicieusement construit.\n\n## Solution\n\nDeux solutions peuvent \u00eatre envisag\u00e9es :\n\n-   Utiliser Flash player 8 (version 8.0.22.0) ;\n-   mettre \u00e0 jour Flash Player 7 en version 7.0.61.0 ou 7.0.60.0.\n",
  "cves": [],
  "initial_release_date": "2005-11-07T00:00:00",
  "last_revision_date": "2005-11-28T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur :",
      "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Eeye du 04 novembre 2005 :",
      "url": "http://www.eeye.com/html/research/advisories/AD20051104.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200511-21 du 25 novembre    2005 :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml"
    },
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 FreeBSD pour linux-flashplugin6 et    linux-flashplugin7 du 13 novembre 2005 :",
      "url": "http://www.vuxml.org/freebsd/pkg-linux-flashplugin6.html"
    },
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 FreeBSD pour linux-flashplugin6 et    linux-flashplugin7 du 13 novembre 2005 :",
      "url": "http://www.vuxml.org/freebsd/pkg-linux-flashplugin7.html"
    },
    {
      "title": "Site de l\u0027\u00e9diteur :",
      "url": "http://www.macromedia.com"
    }
  ],
  "reference": "CERTA-2005-AVI-438",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-11-07T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Eeye et des mises \u00e0 jour de s\u00e9curit\u00e9 FreeBSD.",
      "revision_date": "2005-11-21T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200511-21 et de la r\u00e9ference CVE CAN-2005-2628.",
      "revision_date": "2005-11-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de commandes arbitraires via un fichier swf malicieux"
    },
    {
      "description": "Ex\u00e9cution de commandes arbitraires via un site web malicieux"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 du logiciel Macromedia Flash Player",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 de Macromedia",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…