{"vuid":"VU#159523","idnumber":"159523","name":"Adobe Flash Player integer overflow vulnerability","keywords":["Adobe","Flash Player","arbitrary code execution","DeclareFunction2 tag","SWF file","MEM32-C","INT02-C","APSB08-011","apple_security_update_2008_003"],"overview":"Adobe Flash contains an integer overflow vulnerability. This vulnerability may allow an attacker to execute code on an affected system.","clean_desc":"The Adobe Flash Player is a player for the Flash media format and enables frame-based animations and multimedia to be viewed within a web browser. Adobe Flash Player contains an integer overflow vulnerability. An attacker may be able to trigger this overflow by convincing a user to open a specially crafted SWF file. The SWF file could be hosted or imbedded in a web page.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code or cause the Flash player to crash.","resolution":"Upgrade Adobe has released Flash version 9.0.124.0 to address this issue.","workarounds":"Limit access to Flash files Limiting access to untrusted Flash files may block some attack vectors that use malformed Flash files. See Securing Your Web Browser for more information. Consider using the NoScript extension to whitelist web sites that can run Flash in Mozilla browsers such as Firefox. See the NoScript FAQ for more information.","sysaffected":"","thanks":"Thanks to Adobe for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://www.adobe.com/support/security/bulletins/apsb08-11.html","http://noscript.net/","http://www.us-cert.gov/reading_room/securing_browser/","http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/","http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf","https://www.securecoding.cert.org/confluence/x/vwE","https://www.securecoding.cert.org/confluence/x/QgE"],"cveids":["CVE-2007-0071"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-04-09T17:10:52Z","publicdate":"2008-04-08T00:00:00Z","datefirstpublished":"2008-04-25T16:47:22Z","dateupdated":"2008-07-21T17:59:57Z","revision":26,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"4","cam_internetinfrastructure":"4","cam_population":"20","cam_impact":"20","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"38.8125","cam_scorecurrentwidelyknown":"47.25","cam_scorecurrentwidelyknownexploited":"74.25","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":38.8125,"vulnote":null}