Korean
<< Back
VID 28121
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Windows system has a version of flash player vulnerable to a code execution vulnerability via the SWF file. Macromedia flash player versions prior to 7.0.60.0 could allow a remote attacker to execute arbitrary code, caused due to missing validation of the frame type identifier that is read from a SWF file. This value is used as an index in Flash.ocx to reference an array of function pointers. A remote attacker could create a specially-crafted Web site containing a malicious SWF file, which would cause the script to be executed in the victim's Web browser within the security context of the hosted site, once the site is visited.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.eeye.com/html/research/advisories/AD20051104.html
http://www.sec-consult.com/228.html
http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html
http://www.securitytracker.com/alerts/2005/Nov/1015156.html
http://secunia.com/advisories/17430/
http://www.microsoft.com/technet/security/advisory/910550.mspx

* Platforms Affected:
Macromedia, Inc., Flash Player versions prior to 7.0.60.0
Microsoft Windows Any version
Recommendation Upgrade to the latest version of Flash Player (7.0.60.0 or 8.0.22.0 or later), as listed in Macromedia Security Bulletin MPSB05-07 at http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html
Related URL CVE-2005-2628 (CVE)
Related URL 15332,15334 (SecurityFocus)
Related URL 22959 (ISS)