FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-18 11:12:36 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
aed343b4-5480-11da-b579-001125afbed7Macromedia flash player -- swf file handling arbitrary code

A Secunia Advisory reports:

A vulnerability has been reported in Macromedia Flash Player, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to missing validation of the frame type identifier that is read from a SWF file. This value is used as an index in Flash.ocx to reference an array of function pointers. This can be exploited via a specially crafted SWF file to cause the index to reference memory that is under the attacker's control, which causes Flash Player to use attacker supplied values as function pointers.

Successful exploitation allows execution of arbitrary code.


Discovery 2005-06-27
Entry 2005-11-13
linux-flashplugin6
le 6.0r79_3

linux-flashplugin7
< 7.0r61

http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html
http://secunia.com/advisories/17430/
http://www.eeye.com/html/research/advisories/AD20051104.html