Lucene search

K
nessusThis script is Copyright (C) 2008-2022 Tenable Network Security, Inc.FLASH_PLAYER_APSB08-20.NASL
HistoryNov 11, 2008 - 12:00 a.m.

Flash Player < 9.0.151.0 / 10.0.12.36 Multiple Vulnerabilities (APSB08-18 / APSB08-20 / APSB08-22)

2008-11-1100:00:00
This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.
www.tenable.com
17

According to its version number, an instance of Flash Player on the remote Windows host is 9.0.124.0 or earlier. Such versions are potentially affected by several vulnerabilities :

  • A potential port-scanning issue. (CVE-2007-4324)

  • Possible privilege escalation attacks against web servers hosting Flash content and cross-domain policy files. (CVE-2007-6243)

  • Potential Clipboard attacks. (CVE-2008-3873)

  • FileReference upload and download APIs that don’t require user interaction. (CVE-2008-4401)

  • A ‘Clickjacking’ issue that could be abused by an attacker to lure a web browser user into unknowingly clicking on a link or dialog. (CVE-2008-4503)

  • A potential cross-site scripting vulnerability. (CVE-2008-4818)

  • A potential issue that could be leveraged in to conduct a DNS rebinding attack. (CVE-2008-4819)

  • An information disclosure issue affecting only the ActiveX control. (CVE-2008-4820)

  • An information disclosure issue involving interpretation of the ‘jar:’ protocol and affecting only the plugin for Mozilla browsers. (CVE-2008-4821)

  • An issue with policy file interpretation could potentially lead to bypass of a non-root domain policy. (CVE-2008-4822)

  • A potential HTML injection issue involving an ActionScript attribute. (CVE-2008-4823)

  • Multiple input validation errors could potentially lead to execution of arbitrary code. (CVE-2008-4824)

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(34741);
  script_version("1.19");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/07");

  script_cve_id(
    "CVE-2007-4324",
    "CVE-2007-6243",
    "CVE-2008-3873",
    "CVE-2008-4401",
    "CVE-2008-4503",
    "CVE-2008-4818",
    "CVE-2008-4819",
    "CVE-2008-4820",
    "CVE-2008-4821",
    "CVE-2008-4822",
    "CVE-2008-4823",
    "CVE-2008-4824"
  );
  script_bugtraq_id(
    25260,
    26966,
    31117,
    32129
  );

  script_name(english:"Flash Player < 9.0.151.0 / 10.0.12.36 Multiple Vulnerabilities (APSB08-18 / APSB08-20 / APSB08-22)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host contains a browser plugin that is affected by
multiple issues.");
  script_set_attribute(attribute:"description", value:
"According to its version number, an instance of Flash Player on the
remote Windows host is 9.0.124.0 or earlier.  Such versions are
potentially affected by several vulnerabilities :

  - A potential port-scanning issue. (CVE-2007-4324)

  - Possible privilege escalation attacks against web 
    servers hosting Flash content and cross-domain policy 
    files.  (CVE-2007-6243)

  - Potential Clipboard attacks. (CVE-2008-3873)

  - FileReference upload and download APIs that don't
    require user interaction. (CVE-2008-4401)

  - A 'Clickjacking' issue that could be abused by an 
    attacker to lure a web browser user into unknowingly 
    clicking on a link or dialog. (CVE-2008-4503)

  - A potential cross-site scripting vulnerability. 
    (CVE-2008-4818)

  - A potential issue that could be leveraged in to conduct
    a DNS rebinding attack. (CVE-2008-4819)

  - An information disclosure issue affecting only the 
    ActiveX control. (CVE-2008-4820)

  - An information disclosure issue involving interpretation
    of the 'jar:' protocol and affecting only the plugin for 
    Mozilla browsers. (CVE-2008-4821)

  - An issue with policy file interpretation could 
    potentially lead to bypass of a non-root domain policy. 
    (CVE-2008-4822)

  - A potential HTML injection issue involving an 
    ActionScript attribute. (CVE-2008-4823)

  - Multiple input validation errors could potentially lead
    to execution of arbitrary code. (CVE-2008-4824)");
  script_set_attribute(attribute:"see_also", value:"https://www.adobe.com/support/security/advisories/apsa08-08.html");
  script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb08-18.html");
  script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb08-20.html");
  script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb08-22.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Flash Player version 10.0.12.36 / 9.0.151.0 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 79, 200, 264);

  script_set_attribute(attribute:"patch_publication_date", value:"2008/10/15");
  script_set_attribute(attribute:"plugin_publication_date", value:"2008/11/11");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:flash_player");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2008-2022 Tenable Network Security, Inc.");

  script_dependencies("flash_player_installed.nasl");
  script_require_keys("SMB/Flash_Player/installed");

  exit(0);
}

#

if (!get_kb_item("SMB/Flash_Player/installed")) exit(0);


include("global_settings.inc");


# Identify vulnerable versions.
info = "";

foreach variant (make_list("Plugin", "ActiveX"))
{
  vers = get_kb_list("SMB/Flash_Player/"+variant+"/Version/*");
  files = get_kb_list("SMB/Flash_Player/"+variant+"/File/*");
  if (!isnull(vers) && !isnull(files))
  {
    foreach key (keys(vers))
    {
      ver = vers[key];
      if (ver)
      {
        iver = split(ver, sep:'.', keep:FALSE);
        for (i=0; i<max_index(iver); i++)
          iver[i] = int(iver[i]);

        if (
          iver[0] < 9 ||
          (iver[0] == 9 && iver[1] == 0 && iver[2] <= 124)
        )
        {
          num = key - ("SMB/Flash_Player/"+variant+"/Version/");
          file = files["SMB/Flash_Player/"+variant+"/File/"+num];
          if (variant == "Plugin")
          {
            info += '  - Browser Plugin (for Firefox / Netscape / Opera) :\n';
          }
          else if (variant == "ActiveX")
          {
            info += '  - ActiveX control (for Internet Explorer) :\n';
          }
          info += '    ' + file + ', ' + ver + '\n';
        }
      }
    }
  }
}


if (info)
{
  if (report_verbosity)
  {
    # nb: each vulnerable instance adds 2 lines to 'info'.
    if (max_index(split(info)) > 2) s = "s";
    else s = "";

    report = string(
      "\n",
      "Nessus has identified the following vulnerable instance", s, " of Flash\n",
      "Player installed on the remote host :\n",
      "\n",
      info
    );
    security_hole(port:get_kb_item("SMB/transport"), extra:report);
  }
  else security_hole(get_kb_item("SMB/transport"));
}
VendorProductVersionCPE
adobeflash_playercpe:/a:adobe:flash_player

References