Lucene search

K
certCERTVU:935737
HistoryMar 25, 2008 - 12:00 a.m.

Adobe Flash Player may load arbitrary, malformed cross-domain policy files

2008-03-2500:00:00
www.kb.cert.org
21

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.052 Low

EPSS

Percentile

93.0%

Overview

Adobe Flash Player may load arbitrary, malformed cross-domain policy files. This could allow an attacker to control cross-domain data loading, potentially allowing the attacker to gain access to sensitive information or to manipulate content in other domains.

Description

Adobe Flash Player is a widely deployed application for multimedia viewing on the internet. A vulnerability exists in the way that Flash Player handles cross-domain policy files. An attacker could use a specially crafted cross-domain policy file to circumvent a site’s Flash content data loading security polices.

From Security changes in Flash Player 9:

There is a possibility that a file on a server that does not appear to be a policy file may in fact be used as a policy file. For example, if a server permits uploads by users, but does not intend to open data for cross-domain access, it is possible that a user could deliberately construct a policy file but disguise it as a different type of file, such as an ordinary text, XML, or HTML file, or even as a binary type, such as a PNG or JPEG image file. A user who successfully uploaded this disguised policy file could then write a SWF file that takes advantage of the disguised policy file to load data from outside the server’s domain.


Impact

A remote, unauthenticated attacker may be able to conduct cross-domain and cross-site scripting attacks on sites hosting Flash content. This could allow the attacker to read data or modify Flash content, possibly gaining access to sensitive information or spoofing web site content.


Solution

Adobe has released an update for Flash Player to address this vulnerability. Please see Adobe Security bulletin APSB07-20.


Limit access to Flash files

Limiting access to untrusted Flash files can prevent cross-site scripting attacks that use Flash files. Disable ActiveX controls in the Internet Zone in Microsoft Internet Explorer. See Securing Your Web Browser for more information. Consider using the NoScript extension to whitelist web sites that can run Flash in Mozilla browsers such as Firefox. See the NoScript FAQ for more information.


Vendor Information

935737

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Adobe __ Affected

Updated: March 24, 2008

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Adobe Security bulletin APSB07-20.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23935737 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Adobe credits Toshiharu Sugiyama of UBsecure, Inc. and JPCERT/CC for reporting this vulnerability.

This document was written by Dean Reges and Art Manion.

Other Information

CVE IDs: CVE-2007-6243
Severity Metric: 23.29 Date Public:

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.052 Low

EPSS

Percentile

93.0%