RHSA-2008_0221
Vulnerability from csaf_redhat - Published: 2008-04-08 23:28 - Updated: 2024-11-14 10:05Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.
CWE-20 - Improper Input Validation| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via an SWF file with a modified DeclareFunction2 Actionscript tag, which prevents an object from being instantiated properly.
CWE-20 - Improper Input Validation| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 does not sufficiently restrict the interpretation and usage of cross-domain policy files, which makes it easier for remote attackers to conduct cross-domain and cross-site scripting (XSS) attacks.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
Multiple cross-site scripting (XSS) vulnerabilities in Adobe Flash Player allow remote attackers to inject arbitrary web script or HTML via a crafted SWF file, related to "pre-generated SWF files" and Adobe Dreamweaver CS3 or Adobe Acrobat Connect. NOTE: the asfunction: vector is already covered by CVE-2007-6244.1.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
Interaction error between Adobe Flash and multiple Universal Plug and Play (UPnP) services allow remote attackers to perform Cross-Site Request Forgery (CSRF) style attacks by using the Flash navigateToURL function to send a SOAP message to a UPnP control point, as demonstrated by changing the primary DNS server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
Unspecified vulnerability in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
Adobe Flash Player 8.0.39.0 and earlier, and 9.x up to 9.0.115.0, allows remote attackers to bypass the allowScriptAccess parameter setting via a crafted SWF file with unspecified "Filter evasion" manipulations.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated Adobe Flash Player package that fixes several security issues is\nnow available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise\nLinux 4 Extras, and Red Hat Enterprise Linux 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The flash-plugin package contains a Firefox-compatible Adobe Flash Player\nWeb browser plug-in.\n\nSeveral input validation flaws were found in the way Flash Player displayed\ncertain content. These may have made it possible to execute arbitrary code\non a victim\u0027s machine, if the victim opened a malicious Adobe Flash file.\n(CVE-2007-0071, CVE-2007-6019)\n\nA flaw was found in the way Flash Player established TCP sessions to remote\nhosts. A remote attacker could, consequently, use Flash Player to conduct a\nDNS rebinding attack. (CVE-2007-5275, CVE-2008-1655)\n\nA flaw was found in the way Flash Player restricted the interpretation and\nusage of cross-domain policy files. A remote attacker could use Flash\nPlayer to conduct cross-domain and cross-site scripting attacks.\n(CVE-2007-6243, CVE-2008-1654)\n\nA flaw was found in the way Flash Player interacted with web browsers. An\nattacker could use malicious content presented by Flash Player to conduct a\ncross-site scripting attack. (CVE-2007-6637)\n\nAll users of Adobe Flash Player should upgrade to this updated package,\nwhich contains Flash Player version 9.0.124.0 and resolves these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0221",
"url": "https://access.redhat.com/errata/RHSA-2008:0221"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "367501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367501"
},
{
"category": "external",
"summary": "440664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440664"
},
{
"category": "external",
"summary": "440666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440666"
},
{
"category": "external",
"summary": "440683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440683"
},
{
"category": "external",
"summary": "440684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440684"
},
{
"category": "external",
"summary": "440696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440696"
},
{
"category": "external",
"summary": "440698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440698"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0221.json"
}
],
"title": "Red Hat Security Advisory: flash-plugin security update",
"tracking": {
"current_release_date": "2024-11-14T10:05:59+00:00",
"generator": {
"date": "2024-11-14T10:05:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2008:0221",
"initial_release_date": "2008-04-08T23:28:00+00:00",
"revision_history": [
{
"date": "2008-04-08T23:28:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-04-08T19:28:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:05:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 3 Extras",
"product_id": "3AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3 Extras",
"product": {
"name": "Red Hat Desktop version 3 Extras",
"product_id": "3Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 3 Extras",
"product_id": "3ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 3 Extras",
"product_id": "3WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"product": {
"name": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"product_id": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@9.0.124.0-1.el3.with.oss?arch=i386"
}
}
},
{
"category": "product_version",
"name": "flash-plugin-0:9.0.124.0-1.el5.i386",
"product": {
"name": "flash-plugin-0:9.0.124.0-1.el5.i386",
"product_id": "flash-plugin-0:9.0.124.0-1.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@9.0.124.0-1.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "flash-plugin-0:9.0.124.0-1.el4.i386",
"product": {
"name": "flash-plugin-0:9.0.124.0-1.el4.i386",
"product_id": "flash-plugin-0:9.0.124.0-1.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/flash-plugin@9.0.124.0-1.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras",
"product_id": "3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"relates_to_product_reference": "3AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 as a component of Red Hat Desktop version 3 Extras",
"product_id": "3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"relates_to_product_reference": "3Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras",
"product_id": "3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"relates_to_product_reference": "3ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras",
"product_id": "3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"relates_to_product_reference": "3WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flash-plugin-0:9.0.124.0-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
},
"product_reference": "flash-plugin-0:9.0.124.0-1.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-0071",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2008-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "440684"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Flash Player input validation error",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0071"
},
{
"category": "external",
"summary": "RHBZ#440684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0071",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0071"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0071",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0071"
}
],
"release_date": "2008-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-08T23:28:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0221"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Flash Player input validation error"
},
{
"cve": "CVE-2007-5275",
"discovery_date": "2007-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "367501"
}
],
"notes": [
{
"category": "description",
"text": "The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser\u0027s DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Flash plugin DNS rebinding",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5275"
},
{
"category": "external",
"summary": "RHBZ#367501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=367501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5275",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5275"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5275",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5275"
}
],
"release_date": "2007-10-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-08T23:28:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0221"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Flash plugin DNS rebinding"
},
{
"cve": "CVE-2007-6019",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2008-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "440683"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via an SWF file with a modified DeclareFunction2 Actionscript tag, which prevents an object from being instantiated properly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Flash Player input validation error",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6019"
},
{
"category": "external",
"summary": "RHBZ#440683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6019",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6019"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6019",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6019"
}
],
"release_date": "2008-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-08T23:28:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0221"
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Flash Player input validation error"
},
{
"cve": "CVE-2007-6243",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "440664"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 does not sufficiently restrict the interpretation and usage of cross-domain policy files, which makes it easier for remote attackers to conduct cross-domain and cross-site scripting (XSS) attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Flash Player cross-domain and cross-site scripting flaws",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6243"
},
{
"category": "external",
"summary": "RHBZ#440664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440664"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6243",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6243"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6243",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6243"
}
],
"release_date": "2007-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-08T23:28:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0221"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Flash Player cross-domain and cross-site scripting flaws"
},
{
"cve": "CVE-2007-6637",
"discovery_date": "2008-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "440666"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in Adobe Flash Player allow remote attackers to inject arbitrary web script or HTML via a crafted SWF file, related to \"pre-generated SWF files\" and Adobe Dreamweaver CS3 or Adobe Acrobat Connect. NOTE: the asfunction: vector is already covered by CVE-2007-6244.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Flash Player content injection flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6637"
},
{
"category": "external",
"summary": "RHBZ#440666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440666"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6637",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6637"
}
],
"release_date": "2008-01-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-08T23:28:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0221"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Flash Player content injection flaw"
},
{
"cve": "CVE-2008-1654",
"discovery_date": "2008-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "440698"
}
],
"notes": [
{
"category": "description",
"text": "Interaction error between Adobe Flash and multiple Universal Plug and Play (UPnP) services allow remote attackers to perform Cross-Site Request Forgery (CSRF) style attacks by using the Flash navigateToURL function to send a SOAP message to a UPnP control point, as demonstrated by changing the primary DNS server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Flash Player cross domain HTTP header flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1654"
},
{
"category": "external",
"summary": "RHBZ#440698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1654"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1654",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1654"
}
],
"release_date": "2008-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-08T23:28:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0221"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Flash Player cross domain HTTP header flaw"
},
{
"cve": "CVE-2008-1655",
"discovery_date": "2008-04-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "440696"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Flash Player DNS rebind flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1655"
},
{
"category": "external",
"summary": "RHBZ#440696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=440696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1655"
}
],
"release_date": "2008-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-08T23:28:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0221"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Flash Player DNS rebind flaw"
},
{
"cve": "CVE-2008-3872",
"discovery_date": "2008-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1618334"
}
],
"notes": [
{
"category": "description",
"text": "Adobe Flash Player 8.0.39.0 and earlier, and 9.x up to 9.0.115.0, allows remote attackers to bypass the allowScriptAccess parameter setting via a crafted SWF file with unspecified \"Filter evasion\" manipulations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3872"
},
{
"category": "external",
"summary": "RHBZ#1618334",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618334"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3872"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3872",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3872"
}
],
"release_date": "2008-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-04-08T23:28:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3Desktop-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3ES-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"3WS-LACD:flash-plugin-0:9.0.124.0-1.el3.with.oss.i386",
"4AS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4Desktop-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4ES-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"4WS-LACD:flash-plugin-0:9.0.124.0-1.el4.i386",
"5Client-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386",
"5Server-Supplementary:flash-plugin-0:9.0.124.0-1.el5.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0221"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.