VID |
28151 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
A version of Macromedia Flash Player before version 9.0 has been installed on the host. Macromedia Flash Player versions prior to 9.0 could allow a remote attacker to execute arbitrary code, caused by multiple unspecified vulnerabilities in the way that the Flash Player handles data contained within the Flash (SWF) file. A remote attacker could create a specially-crafted Web site containing a malicious SWF file, which would cause the script to be executed in the victim's Web browser within the security context of the hosted site, once the site is visited.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-20.html http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-21.html http://www.kb.cert.org/vuls/id/474593 http://secunia.com/advisories/20971/ http://www.frsirt.com/english/advisories/2006/2702 http://securitytracker.com/id?1016448
* Platforms Affected: Adobe Systems Incorporated, Macromedia Flash Player versions prior to 9.0 Apple Mac OS X Any version Linux Any version Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of Macromedia Flash Player (9.0.16.0 or later), available from the Adobe Web site at http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash |
Related URL |
CVE-2006-3587 (CVE) |
Related URL |
18894 (SecurityFocus) |
Related URL |
27601 (ISS) |
|