SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Adobe Flash Player Vendors:   Macromedia
Macromedia Flash Player Buffer Overflow in Processing Flash Headers Allows Remote Users to Execute Arbitrary Code
SecurityTracker Alert ID:  1005804
SecurityTracker URL:  http://securitytracker.com/id/1005804
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Dec 13 2002
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to version 6,0,65,0
Description:   A buffer overflow vulnerability was reported in the Macromedia Flash player. A remote user could execute arbitrary code on the target user's computer.

It is reported that a remote user can create a malformed Macromedia Flash movie (SWF) to trigger a buffer overflow in the Flash player when the content is loaded. This could result in the execution of arbitrary code.

No further details were released.

Macromedia credits eEye Digital Security with reporting this flaw.

Impact:   A remote user may be able to cause arbitrary code to be executed on the target user's computer with the privileges of the target user.
Solution:   The vendor has released a fixed version of the player (6,0,65,0), available at:

http://www.macromedia.com/go/getflashplayer/

Vendor URL:  www.macromedia.com/v1/handlers/index.cfm?ID=23569&Method=Full&Title=MPSB02%2D15%20%2D%20Macromedia%20Flash%20Malformed%20Header%20Vulnerability%20Issue&Cache=False (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  New Macromedia Security Zone Bulletins Posted



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
IMPORTANT:

Several security issues that may affect Macromedia Flash 
Player customers have come to our attention recently.

To learn about these new issues and what actions you can
take to address them, please visit the Security Zone at
the Macromedia website:

http://www.macromedia.com/security
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


MSPB02-15 - Macromedia Flash Malformed Header 
Vulnerability Issue.

Originally Posted: December 12, 2002

~~~~~~~
SUMMARY

Macromedia has recently become aware of a vulnerability 
where a hand edited malformed Macromedia Flash movie (SWF) 
header can be exploited to cause a buffer over-write issue 
which could potentially lead to execution of arbitrary code. 

~~~~~~
ISSUES

This can only occur with Macromedia Flash movies (SWF) that 
have been hand edited with a binary editor; Macromedia Flash, 
the authoring tool, will not output movies with this 
vulnerability. 

~~~~~~~~
SOLUTION

Customers should follow the recommendations found in this 
bulletin and download the latest Macromedia Flash Player.

~~~~~~~~~~~~~~~~~~~~~~~~
WHAT MACROMEDIA IS DOING

Macromedia has isolated the issue and released an updated 
player (6,0,65,0 or later) which is available for download 
on the Macromedia Player Download Center: 

http://www.macromedia.com/go/getflashplayer/

Macromedia is committed to the security of the Macromedia 
Flash Player and invests considerable ongoing effort to 
ensure that the security and privacy of all Macromedia 
Flash Player users and all websites serving Macromedia Flash 
content are protected.

Macromedia worked together with eEye Digital Security to 
verify and fix this issue.  Both companies are committed 
to security for their customers.


WHAT CUSTOMERS SHOULD DO:

Customers should follow the recommendations found in this 
bulletin and download the newer Flash Player. 


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Reporting Security Issues
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Macromedia is committed to addressing security issues and
providing customers with the information on how they can
protect themselves. If you identify what you believe may
be a security issue with a Macromedia product, please
send an e-mail to secure@macromedia.com. We will work to
appropriately address and communicate the issue.

~~~~~~~
Receiving Security Bulletins:

When Macromedia becomes aware of a security issue that we
believe significantly affects our products or customers,
we will notify customers when appropriate. Typically, this
notification will be in the form of a security bulletin
explaining the issue and the response. Macromedia customers
who would like to receive notification of new security
bulletins when they are released can sign up for our
security notification service.

For additional information on security issues at Macromedia,
please visit the Security Zone at:

http://www.macromedia.com/security


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
THE INFORMATION PROVIDED BY MACROMEDIA IN THIS BULLETIN
IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND.
MACROMEDIA AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES,
WHETHER EXPRESS OR IMPLIED OR OTHERWISE, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE. ALSO, THERE IS NO WARRANTY OF
NON-INFRINGEMENT, TITLE OR QUIET ENJOYMENT. (USA ONLY)
SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED
WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU.

IN NO EVENT SHALL MACROMEDIA, INC. OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING, WITHOUT
LIMITATION, DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
SPECIAL, PUNITIVE, COVER, LOSS OF PROFITS, BUSINESS
INTERRUPTION OR THE LIKE, OR LOSS OF BUSINESS DAMAGES,
BASED ON ANY THEORY OF LIABILITY INCLUDING BREACH OF
CONTRACT, BREACH OF WARRANTY, TORT(INCLUDING NEGLIGENCE),
PRODUCT LIABILITY OR OTHERWISE, EVEN IF MACROMEDIA, INC.
OR ITS SUPPLIERS OR THEIR REPRESENTATIVES HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. (USA ONLY)
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF
LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, SO THE
ABOVE EXCLUSION OR LIMITATION MAY NOT APPLY TO YOU AND
YOU MAY ALSO HAVE OTHER LEGAL RIGHTS THAT VARY FROM STATE
TO STATE.

Macromedia reserves the right to update the information in
this document with current information.



 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC