CVE-2005-2628

Macromedia Flash 6 and 7 (Flash.ocx) allows remote attackers to execute arbitrary code via a SWF file with a modified frame type identifier that is used as an out-of-bounds array index to a function pointer.
References
Link Resource
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
http://secunia.com/advisories/17430
http://secunia.com/advisories/17437/
http://secunia.com/advisories/17481
http://secunia.com/advisories/17626/
http://secunia.com/advisories/17738
http://secunia.com/advisories/20045
http://secunia.com/advisories/20077
http://securitytracker.com/id?1015156
http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml
http://www.kb.cert.org/vuls/id/146284 US Government Resource
http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_27_sr.html
http://www.osvdb.org/18825
http://www.redhat.com/support/errata/RHSA-2005-835.html
http://www.securityfocus.com/archive/1/415789/30/0/threaded
http://www.securityfocus.com/bid/15332 Patch
http://www.securityfocus.com/bid/17951
http://www.us-cert.gov/cas/techalerts/TA06-129A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-132A.html US Government Resource
http://www.vupen.com/english/advisories/2005/2317
http://www.vupen.com/english/advisories/2006/1744
http://www.vupen.com/english/advisories/2006/1779
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020
https://exchange.xforce.ibmcloud.com/vulnerabilities/22959
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1557
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1987
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
http://secunia.com/advisories/17430
http://secunia.com/advisories/17437/
http://secunia.com/advisories/17481
http://secunia.com/advisories/17626/
http://secunia.com/advisories/17738
http://secunia.com/advisories/20045
http://secunia.com/advisories/20077
http://securitytracker.com/id?1015156
http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml
http://www.kb.cert.org/vuls/id/146284 US Government Resource
http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html Patch Vendor Advisory
http://www.novell.com/linux/security/advisories/2005_27_sr.html
http://www.osvdb.org/18825
http://www.redhat.com/support/errata/RHSA-2005-835.html
http://www.securityfocus.com/archive/1/415789/30/0/threaded
http://www.securityfocus.com/bid/15332 Patch
http://www.securityfocus.com/bid/17951
http://www.us-cert.gov/cas/techalerts/TA06-129A.html US Government Resource
http://www.us-cert.gov/cas/techalerts/TA06-132A.html US Government Resource
http://www.vupen.com/english/advisories/2005/2317
http://www.vupen.com/english/advisories/2006/1744
http://www.vupen.com/english/advisories/2006/1779
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020
https://exchange.xforce.ibmcloud.com/vulnerabilities/22959
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1557
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1987
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:7.0.19.0:*:*:*:*:*:*:*
cpe:2.3:a:macromedia:flash_player:7.0_r19:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html - () http://lists.apple.com/archives/security-announce/2006/May/msg00003.html -
References () http://secunia.com/advisories/17430 - () http://secunia.com/advisories/17430 -
References () http://secunia.com/advisories/17437/ - () http://secunia.com/advisories/17437/ -
References () http://secunia.com/advisories/17481 - () http://secunia.com/advisories/17481 -
References () http://secunia.com/advisories/17626/ - () http://secunia.com/advisories/17626/ -
References () http://secunia.com/advisories/17738 - () http://secunia.com/advisories/17738 -
References () http://secunia.com/advisories/20045 - () http://secunia.com/advisories/20045 -
References () http://secunia.com/advisories/20077 - () http://secunia.com/advisories/20077 -
References () http://securitytracker.com/id?1015156 - () http://securitytracker.com/id?1015156 -
References () http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml - () http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml -
References () http://www.kb.cert.org/vuls/id/146284 - US Government Resource () http://www.kb.cert.org/vuls/id/146284 - US Government Resource
References () http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html - Patch, Vendor Advisory () http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html - Patch, Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2005_27_sr.html - () http://www.novell.com/linux/security/advisories/2005_27_sr.html -
References () http://www.osvdb.org/18825 - () http://www.osvdb.org/18825 -
References () http://www.redhat.com/support/errata/RHSA-2005-835.html - () http://www.redhat.com/support/errata/RHSA-2005-835.html -
References () http://www.securityfocus.com/archive/1/415789/30/0/threaded - () http://www.securityfocus.com/archive/1/415789/30/0/threaded -
References () http://www.securityfocus.com/bid/15332 - Patch () http://www.securityfocus.com/bid/15332 - Patch
References () http://www.securityfocus.com/bid/17951 - () http://www.securityfocus.com/bid/17951 -
References () http://www.us-cert.gov/cas/techalerts/TA06-129A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-129A.html - US Government Resource
References () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-132A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2005/2317 - () http://www.vupen.com/english/advisories/2005/2317 -
References () http://www.vupen.com/english/advisories/2006/1744 - () http://www.vupen.com/english/advisories/2006/1744 -
References () http://www.vupen.com/english/advisories/2006/1779 - () http://www.vupen.com/english/advisories/2006/1779 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/22959 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/22959 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1557 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1557 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1987 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1987 -

Information

Published : 2005-11-05 11:02

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2628

Mitre link : CVE-2005-2628

CVE.ORG link : CVE-2005-2628


JSON object : View

Products Affected

macromedia

  • flash_player