CRLF injection vulnerability in Adobe Flash Player plugin 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, 7.x before 7.0 r67 for Solaris, and before 9.0.28.0 for Mac OS X, allows remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks via CRLF sequences in arguments to the ActionScript functions (1) XML.addRequestHeader and (2) XML.contentType. NOTE: the flexibility of the attack varies depending on the type of web browser being used.
docs.info.apple.com/article.html?artnum=305214
lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
lists.suse.com/archive/suse-security-announce/2006-Dec/0006.html
secunia.com/advisories/22467
secunia.com/advisories/23324
secunia.com/advisories/23581
secunia.com/advisories/24479
secunia.com/advisories/25467
securityreason.com/securityalert/1737
securitytracker.com/id?1017078
sunsolve.sun.com/search/document.do?assetkey=1-26-102932-1
www.adobe.com/support/security/advisories/apsa06-01.html
www.adobe.com/support/security/bulletins/apsb06-18.html
www.osvdb.org/29863
www.rapid7.com/advisories/R7-0026.jsp
www.redhat.com/support/errata/RHSA-2007-0009.html
www.securityfocus.com/archive/1/448997/100/0/threaded
www.securityfocus.com/bid/20592
www.us-cert.gov/cas/techalerts/TA07-072A.html
www.vupen.com/english/advisories/2006/4094
www.vupen.com/english/advisories/2007/0930
www.vupen.com/english/advisories/2007/1999
exchange.xforce.ibmcloud.com/vulnerabilities/29634
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11405