Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.61813
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2008:0980
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2008:0980.

The flash-plugin package contains a Firefox-compatible Adobe Flash Player
Web browser plug-in.

A flaw was found in the way Adobe Flash Player wrote content to the
clipboard. A malicious SWF (Shockwave Flash) file could populate the
clipboard with a URL that could cause the user to accidentally or
mistakenly load an attacker-controlled URL. (CVE-2008-3873)

A flaw was found with Adobe's ActionScript scripting language which allowed
Flash scripts to initiate file uploads and downloads without user
interaction. ActionScript's FileReference.browse and FileReference.download
method calls can now only be initiated via user interaction, such as
through mouse-clicks or key-presses on the keyboard. (CVE-2008-4401)

A flaw was found in Adobe Flash Player's display of Settings Manager
content. A malicious SWF file could trick the user into unintentionally or
mistakenly clicking a link or a dialog which could then give the malicious
SWF file permission to access the local machine's camera or microphone.
(CVE-2008-4503)

Flaws were found in the way Flash Player restricted the interpretation and
usage of cross-domain policy files. A remote attacker could use Flash
Player to conduct cross-domain and cross-site scripting attacks
(CVE-2007-4324, CVE-2007-6243). This update provides enhanced fixes for
these issues.

Flash Player contains a flaw in the way it interprets HTTP response
headers. An attacker could use this flaw to conduct a cross-site scripting
attack against the user running Flash Player. (CVE-2008-4818)

A flaw was found in the way Flash Player handles the ActionScript
attribute. A malicious site could use this flaw to inject arbitrary HTML
content, confusing the user running the browser. (CVE-2008-4823)

A flaw was found in the way Flash Player interprets policy files. It was
possible to bypass a non-root domain policy, possibly allowing a malicious
site to access data in a different domain. (CVE-2008-4822)

A flaw was found in how Flash Player's jar: protocol handler interacts with
Mozilla. A malicious flash application could use this flaw to disclose
sensitive information. (CVE-2008-4821)

Updated Flash Player also extends mechanisms to help prevent an attacker
from executing a DNS rebinding attack. (CVE-2008-4819)

All users of Adobe Flash Player should upgrade to this updated package,
which contains Flash Player version 9.0.151.0.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2008-0980.html
http://adobe.com/products/flashplayer
http://www.redhat.com/security/updates/classification/#important
http://www.adobe.com/support/security/bulletins/apsb08-20.html

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-4324
BugTraq ID: 25260
http://www.securityfocus.com/bid/25260
Bugtraq: 20070809 Design flaw in AS3 socket handling allows port probing (Google Search)
http://www.securityfocus.com/archive/1/475961/100/0/threaded
Cert/CC Advisory: TA07-355A
http://www.us-cert.gov/cas/techalerts/TA07-355A.html
http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml
http://scan.flashsec.org/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11874
http://www.redhat.com/support/errata/RHSA-2007-1126.html
http://www.redhat.com/support/errata/RHSA-2008-0945.html
http://www.redhat.com/support/errata/RHSA-2008-0980.html
http://securitytracker.com/id?1019116
http://secunia.com/advisories/28157
http://secunia.com/advisories/28161
http://secunia.com/advisories/28213
http://secunia.com/advisories/28570
http://secunia.com/advisories/30507
http://secunia.com/advisories/32270
http://secunia.com/advisories/32448
http://secunia.com/advisories/32702
http://secunia.com/advisories/32759
http://secunia.com/advisories/33390
http://securityreason.com/securityalert/2995
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
SuSE Security Announcement: SUSE-SA:2007:069 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html
SuSE Security Announcement: SUSE-SR:2008:025 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
http://www.vupen.com/english/advisories/2007/4258
http://www.vupen.com/english/advisories/2008/1724/references
http://www.vupen.com/english/advisories/2008/2838
Common Vulnerability Exposure (CVE) ID: CVE-2007-6243
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
BugTraq ID: 26929
http://www.securityfocus.com/bid/26929
BugTraq ID: 26966
http://www.securityfocus.com/bid/26966
Cert/CC Advisory: TA08-100A
http://www.us-cert.gov/cas/techalerts/TA08-100A.html
Cert/CC Advisory: TA08-150A
http://www.us-cert.gov/cas/techalerts/TA08-150A.html
CERT/CC vulnerability note: VU#935737
http://www.kb.cert.org/vuls/id/935737
http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml
http://jvn.jp/jp/JVN%2345675516/index.html
http://www.adobe.com/devnet/flashplayer/articles/fplayer9_security.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11069
http://www.redhat.com/support/errata/RHSA-2008-0221.html
http://secunia.com/advisories/29763
http://secunia.com/advisories/29865
http://secunia.com/advisories/30430
SuSE Security Announcement: SUSE-SA:2008:022 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html
http://www.vupen.com/english/advisories/2008/1697
XForce ISS Database: adobe-unspecified-security-bypass(39129)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39129
Common Vulnerability Exposure (CVE) ID: CVE-2008-3873
BugTraq ID: 31117
http://www.securityfocus.com/bid/31117
http://security.gentoo.org/glsa/glsa-200903-23.xml
http://blogs.zdnet.com/security/?p=1733
http://blogs.zdnet.com/security/?p=1759
http://securitytracker.com/id?1020724
http://secunia.com/advisories/34226
XForce ISS Database: adobe-flash-setclipboard-hijacking(44584)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44584
Common Vulnerability Exposure (CVE) ID: CVE-2008-4401
http://securitytracker.com/id?1021061
XForce ISS Database: adobe-flash-filereference-file-upload(45913)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45913
Common Vulnerability Exposure (CVE) ID: CVE-2008-4503
BugTraq ID: 31625
http://www.securityfocus.com/bid/31625
http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/
http://ha.ckers.org/blog/20081007/clickjacking-details/
http://www.securitytracker.com/id?1020996
http://secunia.com/advisories/32163
http://www.vupen.com/english/advisories/2008/2764
XForce ISS Database: adobe-flash-click-hijacking(45721)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45721
Common Vulnerability Exposure (CVE) ID: CVE-2008-4818
http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
BugTraq ID: 32129
http://www.securityfocus.com/bid/32129
Cert/CC Advisory: TA08-350A
http://www.us-cert.gov/cas/techalerts/TA08-350A.html
http://www.securitytracker.com/id?1021146
http://secunia.com/advisories/33179
http://www.vupen.com/english/advisories/2008/3444
XForce ISS Database: adobe-flash-response-xss(46531)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46531
Common Vulnerability Exposure (CVE) ID: CVE-2008-4819
http://www.securitytracker.com/id?1021147
XForce ISS Database: adobe-flash-dnsrebinding-security-bypass1(46532)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46532
Common Vulnerability Exposure (CVE) ID: CVE-2008-4823
http://www.securitytracker.com/id?1021151
Common Vulnerability Exposure (CVE) ID: CVE-2008-4822
http://www.securitytracker.com/id?1021150
XForce ISS Database: adobe-flash-domainpolicy-security-bypass(46535)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46535
Common Vulnerability Exposure (CVE) ID: CVE-2008-4821
http://www.securitytracker.com/id?1021149
XForce ISS Database: adobe-flash-jar-information-disclosure(46534)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46534
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.