FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Macromedia flash player -- swf file handling arbitrary code

Affected packages
linux-flashplugin6 <= 6.0r79_3
linux-flashplugin7 < 7.0r61

Details

VuXML ID aed343b4-5480-11da-b579-001125afbed7
Discovery 2005-06-27
Entry 2005-11-13

A Secunia Advisory reports:

A vulnerability has been reported in Macromedia Flash Player, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to missing validation of the frame type identifier that is read from a SWF file. This value is used as an index in Flash.ocx to reference an array of function pointers. This can be exploited via a specially crafted SWF file to cause the index to reference memory that is under the attacker's control, which causes Flash Player to use attacker supplied values as function pointers.

Successful exploitation allows execution of arbitrary code.

References

URL http://secunia.com/advisories/17430/
URL http://www.eeye.com/html/research/advisories/AD20051104.html
URL http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html