| VID |
28031 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Windows system has an old version of the Flash Player plugin installed. By creating a malicious file with a specially-crafted flash animation, a remote attacker can overflow a buffer in the Flash Player, and execute arbitrary code with the privileges of the user running internet explorer, once the malicious file is opened. An attacker could exploit this vulnerability by hosting the malicious file on a Web site or sending it to a victim within an email.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.macromedia.com/v1/handlers/index.cfm?ID=23821 http://www.securiteam.com/securitynews/5MP051F9FU.html
* Affected Software: Macromedia Flash Player prior to version 6.0.79.0 |
| Recommendation |
Upgrade to the latest version of Macromedia Flash Player (6.0.79.0 or newer)), available from Macromedia web site: http://www.macromedia.com/go/getflashplayer |
| Related URL |
CVE-2002-1382,CVE-2002-0846,CVE-2002-0605 (CVE) |
| Related URL |
4664,5430 (SecurityFocus) |
| Related URL |
8993,9798 (ISS) |
|