CVE-2006-3588

Unspecified vulnerability in Adobe (Macromedia) Flash Player 8.0.24.0 allows remote attackers to cause a denial of service (browser crash) via a malformed, compressed .swf file, a different issue than CVE-2006-3587.
References
Link Resource
http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html
http://secunia.com/advisories/21865 Vendor Advisory
http://secunia.com/advisories/21901 Vendor Advisory
http://secunia.com/advisories/22054 Vendor Advisory
http://secunia.com/advisories/22187 Vendor Advisory
http://secunia.com/advisories/22268 Vendor Advisory
http://secunia.com/advisories/22882 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200610-02.xml
http://securitytracker.com/id?1016449
http://securitytracker.com/id?1016829
http://www.adobe.com/support/security/bulletins/apsb06-11.html
http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-21.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html
http://www.osvdb.org/28733
http://www.redhat.com/support/errata/RHSA-2006-0674.html
http://www.securityfocus.com/bid/18894
http://www.securityfocus.com/bid/19980
http://www.us-cert.gov/cas/techalerts/TA06-318A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2702 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3573 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3577 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3852 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4507 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069
https://exchange.xforce.ibmcloud.com/vulnerabilities/27602
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A432
http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html
http://secunia.com/advisories/21865 Vendor Advisory
http://secunia.com/advisories/21901 Vendor Advisory
http://secunia.com/advisories/22054 Vendor Advisory
http://secunia.com/advisories/22187 Vendor Advisory
http://secunia.com/advisories/22268 Vendor Advisory
http://secunia.com/advisories/22882 Vendor Advisory
http://security.gentoo.org/glsa/glsa-200610-02.xml
http://securitytracker.com/id?1016449
http://securitytracker.com/id?1016829
http://www.adobe.com/support/security/bulletins/apsb06-11.html
http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-21.html Vendor Advisory
http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html
http://www.osvdb.org/28733
http://www.redhat.com/support/errata/RHSA-2006-0674.html
http://www.securityfocus.com/bid/18894
http://www.securityfocus.com/bid/19980
http://www.us-cert.gov/cas/techalerts/TA06-318A.html US Government Resource
http://www.vupen.com/english/advisories/2006/2702 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3573 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3577 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3852 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4507 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069
https://exchange.xforce.ibmcloud.com/vulnerabilities/27602
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A432
Configurations

Configuration 1 (hide)

cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:13

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html - () http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html -
References () http://secunia.com/advisories/21865 - Vendor Advisory () http://secunia.com/advisories/21865 - Vendor Advisory
References () http://secunia.com/advisories/21901 - Vendor Advisory () http://secunia.com/advisories/21901 - Vendor Advisory
References () http://secunia.com/advisories/22054 - Vendor Advisory () http://secunia.com/advisories/22054 - Vendor Advisory
References () http://secunia.com/advisories/22187 - Vendor Advisory () http://secunia.com/advisories/22187 - Vendor Advisory
References () http://secunia.com/advisories/22268 - Vendor Advisory () http://secunia.com/advisories/22268 - Vendor Advisory
References () http://secunia.com/advisories/22882 - Vendor Advisory () http://secunia.com/advisories/22882 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-200610-02.xml - () http://security.gentoo.org/glsa/glsa-200610-02.xml -
References () http://securitytracker.com/id?1016449 - () http://securitytracker.com/id?1016449 -
References () http://securitytracker.com/id?1016829 - () http://securitytracker.com/id?1016829 -
References () http://www.adobe.com/support/security/bulletins/apsb06-11.html - () http://www.adobe.com/support/security/bulletins/apsb06-11.html -
References () http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-21.html - Vendor Advisory () http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-21.html - Vendor Advisory
References () http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html - () http://www.novell.com/linux/security/advisories/2006_53_flashplayer.html -
References () http://www.osvdb.org/28733 - () http://www.osvdb.org/28733 -
References () http://www.redhat.com/support/errata/RHSA-2006-0674.html - () http://www.redhat.com/support/errata/RHSA-2006-0674.html -
References () http://www.securityfocus.com/bid/18894 - () http://www.securityfocus.com/bid/18894 -
References () http://www.securityfocus.com/bid/19980 - () http://www.securityfocus.com/bid/19980 -
References () http://www.us-cert.gov/cas/techalerts/TA06-318A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-318A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/2702 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2702 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/3573 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3573 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/3577 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3577 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/3852 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3852 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/4507 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4507 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27602 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27602 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A432 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A432 -

Information

Published : 2006-07-13 21:05

Updated : 2024-11-21 00:13


NVD link : CVE-2006-3588

Mitre link : CVE-2006-3588

CVE.ORG link : CVE-2006-3588


JSON object : View

Products Affected

adobe

  • flash_player