blob: 940b1fc621f4ed8966f5000e26f7be6c054aacfb [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200708-01">
<title>Macromedia Flash Player: Remote arbitrary code execution</title>
Multiple vulnerabilities have been discovered in Macromedia Flash Player,
allowing for the remote execution of arbitrary code.
<product type="ebuild">adobe-flash</product>
<announced>August 08, 2007</announced>
<revised>May 28, 2009: 02</revised>
<package name="www-plugins/adobe-flash" auto="yes" arch="*">
<unaffected range="ge"></unaffected>
<vulnerable range="lt"></vulnerable>
The Macromedia Flash Player is a renderer for the popular SWF file type
which is commonly used to provide interactive websites, digital
experiences and mobile content.
Mark Hills discovered some errors when interacting with a browser for
keystrokes handling (CVE-2007-2022). Stefano Di Paola and Giorgio Fedon
from Minded Security discovered a boundary error when processing FLV
files (CVE-2007-3456). An input validation error when processing HTTP
referrers has also been reported (CVE-2007-3457).
<impact type="normal">
A remote attacker could entice a user to open a specially crafted file,
possibly leading to the execution of arbitrary code with the privileges
of the user running the Macromedia Flash Player, or sensitive data
There is no known workaround at this time.
All Macromedia Flash Player users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-plugins/adobe-flash-;</code>
<uri link="">CVE-2007-2022</uri>
<uri link="">CVE-2007-3456</uri>
<uri link="">CVE-2007-3457</uri>
<metadata tag="requester" timestamp="Sun, 15 Jul 2007 10:35:19 +0000">
<metadata tag="submitter" timestamp="Tue, 24 Jul 2007 09:40:21 +0000">
<metadata tag="bugReady" timestamp="Tue, 24 Jul 2007 09:40:28 +0000">