Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Summary
Title Adobe Flash player code execution vulnerability
Informations
Name VU#395473 First vendor Publication 2008-05-27
Vendor VU-CERT Last vendor Modification 2008-05-28
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#395473

Adobe Flash player code execution vulnerability

Overview

Adobe Flash contains a vulnerability that may allow an attacker to run code on a system that has a vulnerable version of the Flash player installed. There are reports that this vulnerability is being actively exploited.

I. Description

The Adobe Flash Player is a player for the Flash media format and enables frame-based animations and multimedia to be viewed within a web browser.

Adobe Flash Player contains a code execution vulnerability. An attacker may be able to trigger this overflow by convincing a user to open a specially crafted SWF file. The SWF file could be hosted or embedded in a web page. If an attacker can take control of a website or web server, trusted sites may exploit this vulnerability.

II. Impact

A remoted, unauthenticated attacker may be able to execute arbitrary code.

III. Solution

Update

This issue has been addressed in the most recent version (9.0.124.0) of Adobe Flash. Microsoft Windows users should browse to the Adobe Flash Player Support Center downloads and install the most recent version of Flash site using Internet Explorer, then repeat the process for all other installed browsers (Firefox, Opera, Safari, etc). Systems that are not running Windows should be updated by going to the Adobe Flash Player Support Center downloads and installing the most recent version of Flash with all each web browser on the system.

Users who rely their operating system vendor to provide a packaged version of Adobe Flash should confirm that they have the most recent version.

Workarounds for users running Mozilla-based browsers

  • Using the Mozilla Firefox NoScript extension to whitelist websites that can run scripts and access installed plugins may prevent this vulnerability from being exploited. Note that NoScript is not likely to stop all attack vectors for this vulnerability, see the NoScript FAQ for more information.
  • On Linux systems, the Flash player can be disabled by renaming the Flash plugin. The plugin may be found in several locations, including /usr/lib/firefox/plugins/usr/lib/iceweael/plugins/usr/lib/mozilla/plugins, and is named flashplugin-alternative.so
  • Firefox 3 users can disable the Flash plugin by going to tools, Add-ons, then clicking the Disable button next to the Shockwave Flash plugin. Note that this setting only applies to Mozilla Firefox, and other browsers such as Mozilla, Konqueror, Opera, and Epiphany will still be able to access the Flash plugin.

Workarounds for users running Internet Explorer
  • Applying the kill bit for the following CLSID will prevent the Flash plugin from running:
    {D27CDB6E-AE6D-11cf-96B8-444553540000}
    More information about how to set the kill bit is available in Microsoft Support Document 240797.
Workarounds for web server administrators
  • Ensure that security updates are applied to software running on the server.
  • Reverse proxy servers and web application firewalls may be able to detect and block some attacks. Administrators may also use iptables string matching to block or whitelist the Flash MIME type (application/x-shockwave-flash). Note that firewalls and IPS systems are not likely to stop all attacks.
  • Administrators and web developers should confirm that third parties (such as ad providers) hosting content on their domains are not acting as attack vectors for this vulnerability.

Workarounds for network administrators
  • Firewall, web proxies and IPS systems may be able to stop some attacks. Iptables string matching or the Squid req_mime_type ACL can be used to block access by restricting which sites can send the Flash MIME type (application/x-shockwave-flash). For example, the below iptables command will log all packets that contain the string x-shockwave-flash. Note that this filter can be circumvented by using IPS evasion techniques.
    iptables -A INPUT -m string --algo bm --string 'x-shockwave-flash' -j LOG --log-prefix FLASH

Systems Affected

VendorStatusDate Updated
AdobeVulnerable27-May-2008

References


http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash
http://isc.sans.org/diary.html?storyid=4465
http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue.html
http://www.kb.cert.org/vuls/id/159523
http://www.securityfocus.com/bid/29386
http://noscript.net/
http://www.stopbadware.org/home/security
http://www.owasp.org/index.php/Web_Application_Firewall
http://ddanchev.blogspot.com/2008/05/malware-attack-exploiting-flash-zero.html
http://www.symantec.com/security_response/threatcon/index.jsp
http://www.netfilter.org/documentation/HOWTO//netfilter-extensions-HOWTO-3.html#ss3.18
http://www.visolve.com/squid/squid24s1/access_controls.php
http://kb.adobe.com/selfservice/viewContent.do?externalId=tn_4151

Credit

Thanks to SANS for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

Date Public05/27/2008
Date First Published05/27/2008 06:20:57 PM
Date Last Updated05/28/2008
CERT Advisory 
CVE Name 
US-CERT Technical Alerts 
Metric65.81
Document Revision36

Original Source

Url : http://www.kb.cert.org/vuls/id/395473

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-189 Numeric Errors (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10379
 
Oval ID: oval:org.mitre.oval:def:10379
Title: Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.
Description: Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.
Family: windows Class: vulnerability
Reference(s): CVE-2007-0071
Version: 5
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Microsoft Windows 8
Microsoft Windows Server 2012
Product(s): Adobe Flash Player
Adobe AIR
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 72

OpenVAS Exploits

Date Description
2010-05-12 Name : Mac OS X 10.5.3 Update / Mac OS X Security Update 2008-003
File : nvt/macosx_upd_10_5_3_secupd_2008-003.nasl
2009-11-17 Name : Mac OS X Version
File : nvt/macosx_version.nasl
2009-01-23 Name : SuSE Update for flash-player SUSE-SA:2008:022
File : nvt/gb_suse_2008_022.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200804-21 (netscape-flash)
File : nvt/glsa_200804_21.nasl
2008-09-04 Name : FreeBSD Ports: linux-flashplugin
File : nvt/freebsd_linux-flashplugin3.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
44282 Adobe Flash Player Unspecified Input Validation Arbitrary Code Execution

Snort® IPS/IDS

Date Description
2014-01-10 Adobe Flash Player multimedia file DefineSceneAndFrameLabelData code executio...
RuleID : 28637 - Revision : 6 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player multimedia file DefineSceneAndFrameLabelData code executio...
RuleID : 28636 - Revision : 6 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player DefineSceneAndFrameLabelData memory corruption attempt
RuleID : 17647 - Revision : 8 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player SWF scene and label data memory corruption attempt
RuleID : 13822 - Revision : 10 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player SWF scene and label data memory corruption attempt
RuleID : 13821 - Revision : 10 - Type : FILE-FLASH
2014-01-10 Adobe Flash Player SWF scene and label data memory corruption attempt
RuleID : 13820 - Revision : 13 - Type : FILE-FLASH

Nessus® Vulnerability Scanner

Date Description
2009-08-24 Name : The remote Red Hat host is missing a security update.
File : redhat-RHSA-2008-0221.nasl - Type : ACT_GATHER_INFO
2008-06-02 Name : The remote FreeBSD host is missing a security-related update.
File : freebsd_pkg_04c6187d2d8f11dd98c900163e000016.nasl - Type : ACT_GATHER_INFO
2008-05-29 Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_10_5_3.nasl - Type : ACT_GATHER_INFO
2008-05-29 Name : The remote host is missing a Mac OS X update that fixes various security issues.
File : macosx_SecUpd2008-003.nasl - Type : ACT_GATHER_INFO
2008-04-22 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200804-21.nasl - Type : ACT_GATHER_INFO
2008-04-17 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_flash-player-5159.nasl - Type : ACT_GATHER_INFO
2008-04-17 Name : The remote openSUSE host is missing a security update.
File : suse_flash-player-5161.nasl - Type : ACT_GATHER_INFO
2008-04-10 Name : The remote Windows host contains a browser plugin that is affected by multipl...
File : flash_player_apsb08-11.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2013-05-11 00:57:04
  • Multiple Updates