Executive Summary
Summary | |
---|---|
Title | flash-plugin security update |
Informations | |||
---|---|---|---|
Name | RHSA-2005:835 | First vendor Publication | 2005-11-09 |
Vendor | RedHat | Last vendor Modification | 2005-11-09 |
Severity (Vendor) | Critical | Revision | 00 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated Macromedia Flash Player packages that fix a security issue are now available. This update has been rated as having critical security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 3 Extras - i386 Red Hat Desktop version 3 Extras - i386 Red Hat Enterprise Linux ES version 3 Extras - i386 Red Hat Enterprise Linux WS version 3 Extras - i386 Red Hat Enterprise Linux AS version 4 Extras - i386 Red Hat Desktop version 4 Extras - i386 Red Hat Enterprise Linux ES version 4 Extras - i386 Red Hat Enterprise Linux WS version 4 Extras - i386 3. Problem description: The flash-plugin package contains a Mozilla-compatible Macromedia Flash Player browser plug-in. A buffer overflow bug was discovered in the Macromedia Flash Player. It may be possible to execute arbitrary code on a victim's machine if the victim opens a malicious Macromedia Flash file. The Common Vulnerabilities and Exposures project assigned the name CVE-2005-2628 to this issue. Users of Macromedia Flash Player should upgrade to these updated packages, which contain version 7.0.61 and are not vulnerable to this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/): 172731 - CVE-2005-2628 Macromedia Flash buffer overflow |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2005-835.html |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:1557 | |||
Oval ID: | oval:org.mitre.oval:def:1557 | ||
Title: | Remote Code Execution Vulnerability in Flash Player 6&7 (XP,SP2) | ||
Description: | Macromedia Flash 6 and 7 (Flash.ocx) allows remote attackers to execute arbitrary code via a SWF file with a modified frame type identifier that is used as an out-of-bounds array index to a function pointer. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-2628 | Version: | 5 |
Platform(s): | Microsoft Windows XP | Product(s): | Flash Player |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:1987 | |||
Oval ID: | oval:org.mitre.oval:def:1987 | ||
Title: | Remote Code Execution Vulnerability in Flash Player 6 and 7 (XP,SP1) | ||
Description: | Macromedia Flash 6 and 7 (Flash.ocx) allows remote attackers to execute arbitrary code via a SWF file with a modified frame type identifier that is used as an out-of-bounds array index to a function pointer. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2005-2628 | Version: | 6 |
Platform(s): | Microsoft Windows XP | Product(s): | Adobe Flash Player |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200511-21 (Flash) File : nvt/glsa_200511_21.nasl |
2008-09-04 | Name : FreeBSD Ports: linux-flashplugin6 File : nvt/freebsd_linux-flashplugin6.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
18825 | Macromedia Flash Player Flash.ocx Unspecified Function Arbitrary Code Execution Flash.ocx, part of Macromedia Flash Player, fails to perform proper validation of the frame type identifier from SWF files. The frame type identifier is used as an index into an array of function pointers. With a specially crafted SWF file, a remote attacker can cause arbitrary code execution, resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Adobe Flash frame type identifier memory corruption attempt RuleID : 28672 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash frame type identifier memory corruption attempt RuleID : 28671 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash frame type identifier memory corruption attempt RuleID : 28670 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash ActionDefineFunction memory access exploit attempt RuleID : 28669 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash ActionDefineFunction memory access exploit attempt RuleID : 28668 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash ActionDefineFunction memory access exploit attempt RuleID : 28667 - Revision : 5 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash frame type identifier memory corruption attempt RuleID : 17658 - Revision : 17 - Type : FILE-FLASH |
2014-01-10 | Adobe Flash ActionDefineFunction memory access exploit attempt RuleID : 17457 - Revision : 13 - Type : FILE-FLASH |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-01-24 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2005-835.nasl - Type : ACT_GATHER_INFO |
2006-05-12 | Name : The remote operating system is missing a vendor-supplied patch. File : macosx_SecUpd2006-003.nasl - Type : ACT_GATHER_INFO |
2005-12-07 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200511-21.nasl - Type : ACT_GATHER_INFO |
2005-11-07 | Name : The remote host contains an application that is affected by remote code execu... File : flash_player_memory_access.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:49:46 |
|