Korean
<< Back
VID 28031
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Windows system has an old version of the Flash Player plugin installed.
By creating a malicious file with a specially-crafted flash animation, a remote attacker can overflow a buffer in the Flash Player, and execute arbitrary code with the privileges of the user running internet explorer, once the malicious file is opened. An attacker could exploit this vulnerability by hosting the malicious file on a Web site or sending it to a victim within an email.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.macromedia.com/v1/handlers/index.cfm?ID=23821
http://www.securiteam.com/securitynews/5MP051F9FU.html

* Affected Software:
Macromedia Flash Player prior to version 6.0.79.0
Recommendation Upgrade to the latest version of Macromedia Flash Player (6.0.79.0 or newer)), available from Macromedia web site:
http://www.macromedia.com/go/getflashplayer
Related URL CVE-2002-1382,CVE-2002-0846,CVE-2002-0605 (CVE)
Related URL 4664,5430 (SecurityFocus)
Related URL 8993,9798 (ISS)