VID |
28121 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Windows system has a version of flash player vulnerable to a code execution vulnerability via the SWF file. Macromedia flash player versions prior to 7.0.60.0 could allow a remote attacker to execute arbitrary code, caused due to missing validation of the frame type identifier that is read from a SWF file. This value is used as an index in Flash.ocx to reference an array of function pointers. A remote attacker could create a specially-crafted Web site containing a malicious SWF file, which would cause the script to be executed in the victim's Web browser within the security context of the hosted site, once the site is visited.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.eeye.com/html/research/advisories/AD20051104.html http://www.sec-consult.com/228.html http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html http://www.securitytracker.com/alerts/2005/Nov/1015156.html http://secunia.com/advisories/17430/ http://www.microsoft.com/technet/security/advisory/910550.mspx
* Platforms Affected: Macromedia, Inc., Flash Player versions prior to 7.0.60.0 Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of Flash Player (7.0.60.0 or 8.0.22.0 or later), as listed in Macromedia Security Bulletin MPSB05-07 at http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html |
Related URL |
CVE-2005-2628 (CVE) |
Related URL |
15332,15334 (SecurityFocus) |
Related URL |
22959 (ISS) |
|