Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue.html - Vendor Advisory | |
References | () http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf - Broken Link | |
References | () http://isc.sans.org/diary.html?storyid=4465 - Third Party Advisory | |
References | () http://lists.apple.com/archives/security-announce/2008//May/msg00001.html - Mailing List | |
References | () http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html - Third Party Advisory | |
References | () http://secunia.com/advisories/29763 - Third Party Advisory | |
References | () http://secunia.com/advisories/29865 - Third Party Advisory | |
References | () http://secunia.com/advisories/30404 - Third Party Advisory | |
References | () http://secunia.com/advisories/30430 - Third Party Advisory | |
References | () http://secunia.com/advisories/30507 - Third Party Advisory | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1 - Broken Link | |
References | () http://www.adobe.com/support/security/bulletins/apsb08-11.html - Vendor Advisory | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml - Third Party Advisory | |
References | () http://www.iss.net/threats/289.html - Broken Link | |
References | () http://www.kb.cert.org/vuls/id/159523 - Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/395473 - Third Party Advisory, US Government Resource | |
References | () http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/ - Third Party Advisory | |
References | () http://www.osvdb.org/44282 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2008-0221.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/28695 - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/29386 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1019811 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id?1020114 - Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA08-100A.html - Third Party Advisory, US Government Resource | |
References | () http://www.us-cert.gov/cas/techalerts/TA08-149A.html - Third Party Advisory, US Government Resource | |
References | () http://www.us-cert.gov/cas/techalerts/TA08-150A.html - Third Party Advisory, US Government Resource | |
References | () http://www.vupen.com/english/advisories/2008/1662/references - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2008/1697 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2008/1724/references - Third Party Advisory | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-08-032/ - Third Party Advisory, VDB Entry | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37277 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10379 - Third Party Advisory |
Information
Published : 2008-04-09 21:05
Updated : 2024-11-21 00:24
NVD link : CVE-2007-0071
Mitre link : CVE-2007-0071
CVE.ORG link : CVE-2007-0071
JSON object : View
Products Affected
adobe
- flash_player
CWE
CWE-189
Numeric Errors