ID

VAR-200710-0644


CVE

CVE-2007-5476


TITLE

Adobe Flash Player may load arbitrary, malformed cross-domain policy files

Trust: 0.8

sources: CERT/CC: VU#935737

DESCRIPTION

Unspecified vulnerability in Adobe Flash Player 9.0.47.0 and earlier, when running on Opera before 9.24 on Mac OS X, has unknown "Highly Severe" impact and unknown attack vectors. Adobe Flash Player may load arbitrary, malformed cross-domain policy files. This could allow an attacker to control cross-domain data loading, potentially allowing the attacker to gain access to sensitive information or to manipulate content in other domains. Very few technical details are currently available. We will update this BID as more information emerges. I. The update addresses vulnerabilities in other vendors' products that ship with Apple OS X or OS X Server. These products include: * Adobe Flash * Adobe Shockwave * GNU Tar II. Impact The impacts of these vulnerabilities vary. Potential consequences include arbitrary code execution, sensitive information disclosure, surreptitious video conference initiation, and denial of service. III. This and other updates are available via Software Update or via Apple Downloads. IV. Please send email to <cert@cert.org> with "TA07-352A Feedback VU#905292" in the subject. _________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. _________________________________________________________________ Produced 2007 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> _________________________________________________________________ Revision History December 18, 2007: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBR2hR0fRFkHkM87XOAQL7Egf+NvQEwnN2IGDdDwMEb9C2RDw58FXq0EMZ 7SRO8qbrM0c+G3apLFlmCCivWpGHqms2hzrSeon/Ym1YstHQOQeoJANmsHA3SyKz Wx8TIG10jEiAgytMuyrYjf0w3alXBEsDgXcu8FRc5Z4dg7osMPe7Lco7vVfMvoZG IpEEQu98zxh2p+Vhf1XKr9UfUnkD4O88rRAs+M1oDZd46GH+JvkYLgLCmkMSwIcs Vi4M7J+KHUBBkaMZYjnp+YqRwNDq9sGskVEOVDMk9OXw7VhAR7Kf8/zo9Tt1h3P0 h9JeMBHHb0M0MEtYHx/7JxpleXS3LtyiL0kDb9cbMjxU0kKK9SKb/Q== =Y1jd -----END PGP SIGNATURE----- . 3) An error exists when pinning a hostname to an IP address. This can be exploited to bypass certain security restrictions on web servers hosting cross-domain policy files. 5) Input passed to unspecified parameters when handling the "asfunction:" protocol is not properly sanitised before being returned to the user. This can be exploited to inject arbitrary HTML and script code in a user's browser session in context of an affected site. 6) Input passed to unspecified parameters when calling the "navigateToURL" function is not properly sanitised before being returned to the user. This can be exploited to inject arbitrary HTML and script code in a user's browser session in context of an affected site. 7) An unspecified error can be exploited to modify HTTP headers and conduct HTTP request splitting attacks. 8) An error within the implementation of the Socket or XMLSocket ActionScript classes can be exploited to determine if a port on a remote host is opened or closed. 9) An error within the setting of memory permissions in Adobe Flash Player for Linux can be exploited by malicious, local users to gain escalated privileges. For more information see vulnerability #3 in: SA27277 The vulnerabilities are reported in versions prior to 9.0.115.0. 3) The vendor credits Dan Boneh, Adam Barth, Andrew Bortz, Collin Jackson, and Weidong Shao of Stanford University. and JPCERT/CC. 6) The vendor credits Collin Jackson and Adam Barth of Stanford University. 9) The vendor credits Jesse Michael and Thomas Biege of SUSE. -- SPARC Platform -- Solaris 10: Apply patch 125332-03 or later. OpenSolaris: Fixed in build snv_89 or later. -- x86 Platform -- Solaris 10: Apply patch 125333-03 or later. OpenSolaris: Fixed in build snv_89 or later. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. Get a free trial of the Secunia Vulnerability Intelligence Solutions: http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv ---------------------------------------------------------------------- TITLE: Apple Mac OS X Security Update Fixes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA28136 VERIFY ADVISORY: http://secunia.com/advisories/28136/ CRITICAL: Highly critical IMPACT: Hijacking, Security Bypass, Cross Site Scripting, Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS, System access WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities. 1) A format string error in the URL handler of Address Book can be exploited to execute arbitrary code when a user views a specially crafted web page. 2) An error in the handling of downloaded files in CFNetwork can be exploited via directory traversal attacks to automatically download files to arbitrary folders when a user is enticed to visit a specially crafted web page. 3) An unspecified error exists in ColorSync when processing images with an embedded ColorSync profile, which can be exploited to cause a memory corruption. Successful exploitation may allow execution of arbitrary code. 4) A race condition exists in the "CFURLWriteDataAndPropertiesToResource" API, which can lead to files being created with insecure permissions. 5) A boundary error exists in the printer driver for CUPS. This can be exploited to cause a buffer overflow and allows an admin user to execute arbitrary code with system privileges by passing a specially crafted URI to the CUPS service. 6) A boundary error in CUPS can be exploited by malicious people to compromise a vulnerable system. For more information: SA27233 7) An integer underflow error in the CUPS backend in the handling of SNMP responses can be exploited to cause a stack-based buffer overflow by sending a specially crafted SNMP response. Successful exploitation allows execution of arbitrary code, but requires that SNMP is enabled. 8) A boundary error in Desktop Services can be exploited to cause a heap-based buffer overflow when a user opens a directory containing a specially crafted .DS_Store file. Successful exploitation may allow execution of arbitrary code. 9) An input validation error in tar can be exploited by malicious people to compromise a user's system. For more information: SA26573 10) An unspecified error in iChat can be exploited by malicious people on the local network to initiate a video connection without the user's approval. 11) An unspecified error exists within IO Storage Family when handling GUID partition maps within a disk image. This can be exploited to execute arbitrary code when a user is enticed to open a specially crafted disk image. 12) Launch Services does not handle HTML files as potentially unsafe content. This can be exploited to disclose sensitive information or conduct cross-site scripting attacks by enticing a user to open a specially crafted HTML file. 13) A vulnerability in Mail in the handling of unsafe file types can be exploited to compromise a user's system. For more information: SA27785 14) An error in Mail can cause the application to default to SMTP plaintext authentication if the server supports only MD5 Challenge-Response authentication and plaintext authentication. 15) Some vulnerabilities in perl can be exploited by malicious people to compromise a vulnerable system. For more information: SA27546 16) A security issue in python can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. For more information: SA26837 17) Plug-ins in Quick Look are not restricted from making network requests. This may lead to the disclosure of sensitive information when previewing an HTML file. 18) URLs contained in movie files may be accessed when creating an icon for a movie file or previewing a movie file using QuickLook. 19) Some security issues in ruby can be exploited by malicious people to conduct spoofing attacks. For more information: SA26985 20) Some vulnerabilities and a security issue in Ruby on Rails can be exploited by malicious people to disclose sensitive information or to conduct session fixation attacks. For more information: SA25699 SA27781 21) An error in Safari allows a page to navigate the subframes of any other page. This can be exploited to conduct cross-site scripting attacks and to disclose sensitive information when a user visits a specially crafted web page. 22) An unspecified error in Safari in the handling of RSS feeds can be exploited to cause a memory corruption and may allow execution of arbitrary code when a user accesses a specially crafted URL. 23) Some boundary errors in Samba can be exploited by malicious people to compromise a vulnerable system. For more information: SA27450 24) Some boundary errors in the Shockwave Plug-in can be exploited by malicious people to compromise a user's system. For more information: SA19218 25) A boundary error in the processing of command line arguments to "mount_smbfs" and "smbutil" can be exploited to cause a stack-based buffer overflow and execute arbitrary code with system privileges. 26) The distribution definition file used in Software Update is received by using HTTP without any authentication and allows execution of arbitrary commands. Successful exploitation requires a MitM (Man-in-the-Middle) attack. 27) An error due to an insecure file operation exists in the handling of output files in SpinTracer. This may allow a malicious, local user to execute arbitrary code with system privileges. 28) An unspecified error exists in the Microsoft Office Spotlight Importer, which can be exploited to cause a memory corruption when a user downloads a specially crafted .xls file. Successful exploitation may allow execution of arbitrary code. 29) Some vulnerabilities in tcpdump can be exploited by malicious people to cause a DoS or to compromise a user's system. For more information: SA24318 SA26135 30) Some vulnerabilities exist the Perl Compatible Regular Expressions (PCRE) library used by XQuery, which can potentially be exploited to compromise a vulnerable system. Security Update 2007-009 (10.4.11 Universal): http://www.apple.com/support/downloads/securityupdate200700910411universal.html Security Update 2007-009 (10.4.11 PPC): http://www.apple.com/support/downloads/securityupdate200700910411ppc.html Security Update 2007-009 (10.5.1): http://www.apple.com/support/downloads/securityupdate20070091051.html PROVIDED AND/OR DISCOVERED BY: 2) The vendor credits Sean Harding. 3) The vendor credits Tom Ferris, Adobe Secure Software Engineering Team (ASSET). 5) The vendor credits Dave Camp, Critical Path Software. 7) The vendor credits Wei Wang, McAfee Avert Labs. 12) The vendor credits Michal Zalewski, Google Inc. 13) The vendor credits Xeno Kovah, originally reported in Mac OS X 10.5 by heise Security. 15) The vendor credits Tavis Ormandy and Will Drewry, Google Security Team. 18) The vendor credits Lukhnos D. Liu, Lithoglyph Inc. 26) Moritz Jodeit. 27) The vendor credits Kevin Finisterre, DigitalMunition ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307179 OTHER REFERENCES: SA19218: http://secunia.com/advisories/19218/ SA24318: http://secunia.com/advisories/24318/ SA25699: http://secunia.com/advisories/25699/ SA26135: http://secunia.com/advisories/26135/ SA26573: http://secunia.com/advisories/26573/ SA26837: http://secunia.com/advisories/26837/ SA26985: http://secunia.com/advisories/26985/ SA27233: http://secunia.com/advisories/27233/ SA27450: http://secunia.com/advisories/27450/ SA27543: http://secunia.com/advisories/27543/ SA27546: http://secunia.com/advisories/27546/ SA27781: http://secunia.com/advisories/27781/ SA27785: http://secunia.com/advisories/27785/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.06

sources: NVD: CVE-2007-5476 // CERT/CC: VU#935737 // JVNDB: JVNDB-2007-001049 // BID: 26274 // VULHUB: VHN-28838 // PACKETSTORM: 61950 // PACKETSTORM: 61957 // PACKETSTORM: 66949 // PACKETSTORM: 61915

AFFECTED PRODUCTS

vendor:operamodel:browserscope:eqversion:3.62

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:4.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.53

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.53

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.23

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:3.00

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.20

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.12

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.21

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.22

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.60

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:3.61

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.54

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.05

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:3.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:3.60

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.12

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.20

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.52

Trust: 1.0

vendor:operamodel:browserscope:eqversion:2.00

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.54

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.03

Trust: 1.0

vendor:operamodel:browserscope:eqversion:4.02

Trust: 1.0

vendor:adobemodel:flash playerscope:lteversion:9.0.47.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:3.21

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.50

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.06

Trust: 1.0

vendor:operamodel:browserscope:lteversion:9.23

Trust: 1.0

vendor:operamodel:browserscope:eqversion:1.00

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.12

Trust: 1.0

vendor:operamodel:browserscope:eqversion:2.12

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.03

Trust: 1.0

vendor:operamodel:browserscope:eqversion:5.02

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.51

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.11

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.22

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.52

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.21

Trust: 1.0

vendor:operamodel:browserscope:eqversion:3.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.04

Trust: 1.0

vendor:operamodel:browserscope:eqversion:3.51

Trust: 1.0

vendor:operamodel:browserscope:eqversion:7.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:8.51

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.01

Trust: 1.0

vendor:operamodel:browserscope:eqversion:2.10

Trust: 1.0

vendor:operamodel:browserscope:eqversion:4.00

Trust: 1.0

vendor:operamodel:browserscope:eqversion:9.0

Trust: 1.0

vendor:operamodel:browserscope:eqversion:6.1

Trust: 1.0

vendor:adobemodel: - scope: - version: -

Trust: 0.8

vendor:opera asamodel:operascope:ltversion:version

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.1

Trust: 0.8

vendor:adobemodel:flash playerscope:lteversion:7.0.70.0 and earlier

Trust: 0.8

vendor:adobemodel:flash playerscope:lteversion:9.0.48.0 and earlier

Trust: 0.8

vendor:opera asamodel:operascope:eqversion:for mac os version 9.24

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:adobemodel:flash playerscope:lteversion:8.0.35.0 and earlier

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.1

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope: - version: -

Trust: 0.6

vendor:sunmodel:solaris 10.0 x86scope: - version: -

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:10.0

Trust: 0.3

vendor:sunmodel:opensolaris build snv 88scope: - version: -

Trust: 0.3

vendor:nortelmodel:networks self-service peri workstationscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks self-service peri applicationscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks self-service mpsscope:eqversion:10000

Trust: 0.3

vendor:nortelmodel:networks self-service media processing serverscope:eqversion:0

Trust: 0.3

vendor:nortelmodel:networks self-service ccss7scope:eqversion:-0

Trust: 0.3

vendor:nortelmodel:networks self-servicescope:eqversion:0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:adobemodel:flexscope:eqversion:2.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.48.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.47.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.45.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.31.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:9.0.28.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:8.0.34.0

Trust: 0.3

vendor:adobemodel:flash playerscope:eqversion:7.0.69.0

Trust: 0.3

vendor:adobemodel:flash cs3 professionalscope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#935737 // BID: 26274 // JVNDB: JVNDB-2007-001049 // CNNVD: CNNVD-200710-314 // NVD: CVE-2007-5476

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-5476
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#935737
value: 23.29

Trust: 0.8

NVD: CVE-2007-5476
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200710-314
value: CRITICAL

Trust: 0.6

VULHUB: VHN-28838
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-5476
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-28838
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#935737 // VULHUB: VHN-28838 // JVNDB: JVNDB-2007-001049 // CNNVD: CNNVD-200710-314 // NVD: CVE-2007-5476

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2007-5476

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200710-314

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200710-314

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001049

PATCH

title:APSB07-20url:http://www.adobe.com/support/security/bulletins/apsb07-20.html

Trust: 1.6

title:APSA07-05url:http://www.adobe.com/support/security/advisories/apsa07-05.html

Trust: 0.8

title:APSA07-05url:http://www.adobe.com/jp/support/security/advisories/apsa07-05.html

Trust: 0.8

title:Security Update 2007-009url:http://docs.info.apple.com/article.html?artnum=307179-en

Trust: 0.8

title:Security Update 2007-009url:http://docs.info.apple.com/article.html?artnum=307179-ja

Trust: 0.8

title:868url:http://www.opera.com/support/search/view/868/

Trust: 0.8

title:TA07-355Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta07-355a.html

Trust: 0.8

title:TA07-352Aurl:http://software.fujitsu.com/jp/security/vulnerabilities/ta07-352a.html

Trust: 0.8

sources: JVNDB: JVNDB-2007-001049

EXTERNAL IDS

db:SECUNIAid:28161

Trust: 3.4

db:BIDid:26274

Trust: 2.8

db:NVDid:CVE-2007-5476

Trust: 2.8

db:USCERTid:TA07-352A

Trust: 2.6

db:SECUNIAid:28136

Trust: 2.6

db:USCERTid:TA07-355A

Trust: 2.5

db:SECTRACKid:1018830

Trust: 2.5

db:SECUNIAid:30507

Trust: 1.8

db:VUPENid:ADV-2007-4258

Trust: 1.7

db:VUPENid:ADV-2007-4238

Trust: 1.7

db:VUPENid:ADV-2008-1724

Trust: 1.7

db:XFid:37250

Trust: 1.4

db:CERT/CCid:VU#935737

Trust: 0.8

db:USCERTid:SA07-352A

Trust: 0.8

db:USCERTid:SA07-355A

Trust: 0.8

db:JVNDBid:JVNDB-2007-001049

Trust: 0.8

db:CERT/CCid:TA07-355A

Trust: 0.6

db:CERT/CCid:TA07-352A

Trust: 0.6

db:SUNALERTid:238305

Trust: 0.6

db:APPLEid:APPLE-SA-2007-12-17

Trust: 0.6

db:CNNVDid:CNNVD-200710-314

Trust: 0.6

db:VULHUBid:VHN-28838

Trust: 0.1

db:PACKETSTORMid:61950

Trust: 0.1

db:PACKETSTORMid:61957

Trust: 0.1

db:PACKETSTORMid:66949

Trust: 0.1

db:PACKETSTORMid:61915

Trust: 0.1

sources: CERT/CC: VU#935737 // VULHUB: VHN-28838 // BID: 26274 // JVNDB: JVNDB-2007-001049 // PACKETSTORM: 61950 // PACKETSTORM: 61957 // PACKETSTORM: 66949 // PACKETSTORM: 61915 // CNNVD: CNNVD-200710-314 // NVD: CVE-2007-5476

REFERENCES

url:http://www.adobe.com/support/security/bulletins/apsb07-20.html

Trust: 2.9

url:http://www.securityfocus.com/bid/26274

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta07-352a.html

Trust: 2.5

url:http://www.us-cert.gov/cas/techalerts/ta07-355a.html

Trust: 2.5

url:http://secunia.com/advisories/28136

Trust: 2.5

url:http://secunia.com/advisories/28161

Trust: 2.5

url:http://www.adobe.com/support/security/advisories/apsa07-05.html

Trust: 2.0

url:http://www.opera.com/support/search/view/868/

Trust: 2.0

url:http://docs.info.apple.com/article.html?artnum=307179

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2007/dec/msg00002.html

Trust: 1.7

url:http://www.securitytracker.com/id?1018830

Trust: 1.7

url:http://secunia.com/advisories/30507

Trust: 1.7

url:http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2007/4238

Trust: 1.4

url:http://www.frsirt.com/english/advisories/2007/4258

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/37250

Trust: 1.4

url:http://www.vupen.com/english/advisories/2007/4238

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/4258

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/1724/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/37250

Trust: 1.1

url:http://secunia.com/advisories/28161/

Trust: 1.0

url:http://www.adobe.com/devnet/flash/articles/fplayer_security.html

Trust: 0.8

url:http://www.adobe.com/devnet/flashplayer/articles/fplayer9_security.html

Trust: 0.8

url:http://www.adobe.com/devnet/flashplayer/articles/cross_domain_policy.html

Trust: 0.8

url:http://jvn.jp/jp/jvn%2345675516/index.html

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-5476

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-352a/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnta07-355a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-352a/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta07-355a/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-5476

Trust: 0.8

url:http://securitytracker.com/id?1018830

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-352a.html

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa07-355a.html

Trust: 0.8

url:http://www.cyberpolice.go.jp/important/2007/20071219_160713.html

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/1724/references

Trust: 0.6

url:http://sunsolve.sun.com/search/document.do?assetkey=1-66-238305-1

Trust: 0.4

url:http://www.adobe.com

Trust: 0.3

url:http://www.opera.com/download/index.dml?custom=yes

Trust: 0.3

url:http://support.nortel.com/go/main.jsp?cscat=bltndetail&id=745016

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/about_secunia_advisories/

Trust: 0.3

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.2

url:http://secunia.com/advisories/27543/

Trust: 0.2

url:http://docs.info.apple.com/article.html?artnum=307179>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=apple-2007-009>

Trust: 0.1

url:http://www.apple.com/support/downloads/>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta07-352a.html>

Trust: 0.1

url:http://secunia.com/product/11901/

Trust: 0.1

url:http://secunia.com/product/6153/

Trust: 0.1

url:http://www.stage.adobe.com/go/getflash

Trust: 0.1

url:http://secunia.com/advisories/27277/

Trust: 0.1

url:http://secunia.com/product/14760/

Trust: 0.1

url:http://www.adobe.com/support/flash/downloads.html

Trust: 0.1

url:http://www.stage.adobe.com/support/flashplayer/downloads.html#fp9

Trust: 0.1

url:http://www.stage.adobe.com/licensing/distribution

Trust: 0.1

url:http://secunia.com/product/2634/

Trust: 0.1

url:http://secunia.com/product/14231/

Trust: 0.1

url:http://secunia.com/product/7024/

Trust: 0.1

url:http://secunia.com/product/4813/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://secunia.com/advisories/28083/

Trust: 0.1

url:http://secunia.com/advisories/30507/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate200700910411universal.html

Trust: 0.1

url:http://secunia.com/advisories/28136/

Trust: 0.1

url:http://secunia.com/advisories/26837/

Trust: 0.1

url:http://secunia.com/advisories/24318/

Trust: 0.1

url:http://secunia.com/advisories/27785/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate20070091051.html

Trust: 0.1

url:http://secunia.com/advisories/26135/

Trust: 0.1

url:http://secunia.com/advisories/26985/

Trust: 0.1

url:http://secunia.com/advisories/27450/

Trust: 0.1

url:http://secunia.com/advisories/27546/

Trust: 0.1

url:http://secunia.com/advisories/27233/

Trust: 0.1

url:http://secunia.com/advisories/27781/

Trust: 0.1

url:http://secunia.com/advisories/25699/

Trust: 0.1

url:http://secunia.com/advisories/26573/

Trust: 0.1

url:http://secunia.com/advisories/19218/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate200700910411ppc.html

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

sources: CERT/CC: VU#935737 // VULHUB: VHN-28838 // BID: 26274 // JVNDB: JVNDB-2007-001049 // PACKETSTORM: 61950 // PACKETSTORM: 61957 // PACKETSTORM: 66949 // PACKETSTORM: 61915 // CNNVD: CNNVD-200710-314 // NVD: CVE-2007-5476

CREDITS

Opera Software is credited with the discovery of this issue.

Trust: 0.9

sources: BID: 26274 // CNNVD: CNNVD-200710-314

SOURCES

db:CERT/CCid:VU#935737
db:VULHUBid:VHN-28838
db:BIDid:26274
db:JVNDBid:JVNDB-2007-001049
db:PACKETSTORMid:61950
db:PACKETSTORMid:61957
db:PACKETSTORMid:66949
db:PACKETSTORMid:61915
db:CNNVDid:CNNVD-200710-314
db:NVDid:CVE-2007-5476

LAST UPDATE DATE

2024-11-23T19:30:19.719000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#935737date:2008-03-25T00:00:00
db:VULHUBid:VHN-28838date:2017-07-29T00:00:00
db:BIDid:26274date:2008-07-15T23:09:00
db:JVNDBid:JVNDB-2007-001049date:2008-01-08T00:00:00
db:CNNVDid:CNNVD-200710-314date:2007-10-24T00:00:00
db:NVDid:CVE-2007-5476date:2024-11-21T00:37:58.930

SOURCES RELEASE DATE

db:CERT/CCid:VU#935737date:2008-03-25T00:00:00
db:VULHUBid:VHN-28838date:2007-10-18T00:00:00
db:BIDid:26274date:2007-10-31T00:00:00
db:JVNDBid:JVNDB-2007-001049date:2008-01-08T00:00:00
db:PACKETSTORMid:61950date:2007-12-20T00:43:04
db:PACKETSTORMid:61957date:2007-12-20T01:37:58
db:PACKETSTORMid:66949date:2008-06-04T00:32:02
db:PACKETSTORMid:61915date:2007-12-19T00:48:29
db:CNNVDid:CNNVD-200710-314date:2007-10-17T00:00:00
db:NVDid:CVE-2007-5476date:2007-10-18T00:17:00