CERTA-2005-AVI-438
Vulnerability from certfr_avis

None

Description

Une vulnérabilité a été découverte dans la gestion des variables des fichiers SWF du logiciel Macromedia Flash Player.

Cette vulnérabilité peut être exploitée afin d'exécuter du code arbitraire via un site web ou un fichier SWF malicieusement construit.

Solution

Deux solutions peuvent être envisagées :

  • Utiliser Flash player 8 (version 8.0.22.0) ;
  • mettre à jour Flash Player 7 en version 7.0.61.0 ou 7.0.60.0.

Macromedia Flash Player version 7.0.19.0 et versions inférieures.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eMacromedia Flash Player version  7.0.19.0 et versions inf\u00e9rieures.\u003c/p\u003e",
  "content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans la gestion des variables des\nfichiers SWF du logiciel Macromedia Flash Player.\n\nCette vuln\u00e9rabilit\u00e9 peut \u00eatre exploit\u00e9e afin d\u0027ex\u00e9cuter du code\narbitraire via un site web ou un fichier SWF malicieusement construit.\n\n## Solution\n\nDeux solutions peuvent \u00eatre envisag\u00e9es :\n\n-   Utiliser Flash player 8 (version 8.0.22.0) ;\n-   mettre \u00e0 jour Flash Player 7 en version 7.0.61.0 ou 7.0.60.0.\n",
  "cves": [],
  "initial_release_date": "2005-11-07T00:00:00",
  "last_revision_date": "2005-11-28T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur :",
      "url": "http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Eeye du 04 novembre 2005 :",
      "url": "http://www.eeye.com/html/research/advisories/AD20051104.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200511-21 du 25 novembre    2005 :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml"
    },
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 FreeBSD pour linux-flashplugin6 et    linux-flashplugin7 du 13 novembre 2005 :",
      "url": "http://www.vuxml.org/freebsd/pkg-linux-flashplugin6.html"
    },
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 FreeBSD pour linux-flashplugin6 et    linux-flashplugin7 du 13 novembre 2005 :",
      "url": "http://www.vuxml.org/freebsd/pkg-linux-flashplugin7.html"
    },
    {
      "title": "Site de l\u0027\u00e9diteur :",
      "url": "http://www.macromedia.com"
    }
  ],
  "reference": "CERTA-2005-AVI-438",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-11-07T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Eeye et des mises \u00e0 jour de s\u00e9curit\u00e9 FreeBSD.",
      "revision_date": "2005-11-21T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200511-21 et de la r\u00e9ference CVE CAN-2005-2628.",
      "revision_date": "2005-11-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de commandes arbitraires via un fichier swf malicieux"
    },
    {
      "description": "Ex\u00e9cution de commandes arbitraires via un site web malicieux"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 du logiciel Macromedia Flash Player",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 de Macromedia",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…