SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Macromedia Flash Media Server Vendors:   Adobe Systems Incorporated
Adobe Flash Media Server RTMP Integer Overflows Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1019399
SecurityTracker URL:  http://securitytracker.com/id/1019399
CVE Reference:   CVE-2007-6149   (Links to External Site)
Date:  Feb 13 2008
Impact:   Execution of arbitrary code via network, Root access via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.0.4 and prior versions
Description:   A vulnerability was reported in Adobe Flash Media Server. A remote user can execute arbitrary code on the target system.

A remote user can send a specially crafted Real Time Message Protocol (RTMP) message to to the Edge server on TCP port 1935 or 19350 to trigger an integer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target service (System privileges on Windows-based systems).

The vendor was notified on November 27, 2007.

Sebastian Apelt reported this vulnerability via VeriSign iDefense.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fixed version (2.0.5).

The Adobe advisory is available at:

http://www.adobe.com/support/security/bulletins/apsb08-03.html

Vendor URL:  www.adobe.com/support/security/bulletins/apsb08-03.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Red Hat Enterprise), Windows (2000), Windows (2003)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 13 2008 (Adobe Issues Fix for Adobe Connect Enterprise Server) Adobe Flash Media Server RTMP Integer Overflows Let Remote Users Execute Arbitrary Code
Adobe has issued a fix for Adobe Connect Enterprise Server 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC