FreeBSD : Macromedia flash player -- swf file handling arbitrary code (aed343b4-5480-11da-b579-001125afbed7)

This script is Copyright (C) 2006-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A Secunia Advisory reports :

A vulnerability has been reported in Macromedia Flash Player, which
can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to missing validation of the frame
type identifier that is read from a SWF file. This value is used as an
index in Flash.ocx to reference an array of function pointers. This
can be exploited via a specially crafted SWF file to cause the index
to reference memory that is under the attacker's control, which causes
Flash Player to use attacker supplied values as function pointers.

Successful exploitation allows execution of arbitrary code.

See also :

http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html
http://www.eeye.com/html/research/advisories/AD20051104.html
http://www.nessus.org/u?c651e9b7

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21494 (freebsd_pkg_aed343b4548011dab579001125afbed7.nasl)

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now