Release date: December 18, 2007
Vulnerability identifier: APSB07-20
CVE number: CVE-2007-6242, CVE-2007- 4768, CVE-2007-5275, CVE-2007- 6243, CVE-2007- 6244, CVE-2007- 6245, CVE-2007-4324, CVE-2007- 6246, CVE-2007-5476
Platform: All platforms
Affected software versions: Adobe Flash Player 9.0.48.0 and earlier, 8.0.35.0 and earlier, and 7.0.70.0 and earlier.
Critical vulnerabilities have been identified in Adobe Flash Player that could allow an attacker who successfully exploits these potential vulnerabilities to take control of the affected system. A malicious SWF must be loaded in Flash Player by the user for an attacker to exploit these potential vulnerabilities. Users are recommended to update to the most current version of Flash Player available for their platform.
Adobe Flash Player 9.0.48.0 and earlier, 8.0.35.0 and earlier, and 7.0.70.0 and earlier.
To verify the Adobe Flash Player version number, access the About Flash Player page, or right-click on Flash content and select "About Adobe (or Macromedia) Flash Player" from the menu. If you use multiple browsers, perform the check for each browser you have installed on your system.
Adobe recommends all users of Adobe Flash Player 9.0.48.0 and earlier versions upgrade to the newest version 9.0.115.0, by downloading it from the Player Download Center, or by using the auto-update mechanism within the product when prompted.
For customers who cannot upgrade to Adobe Flash Player 9, Adobe has developed a patched version of Flash Player 7. Please refer to the Flash Player update TechNote.
Adobe categorizes this as a critical update and recommends affected users upgrade to version 9.0.115.0.
Multiple input validation errors have been identified in Flash Player 9.0.48.0 and earlier versions that could lead to the potential execution of arbitrary code. These vulnerabilities could be accessed through content delivered from a remote location via the user’s web browser, email client, or other applications that include or reference the Flash Player. (CVE-2007- 4768, CVE-2007-6242)
This update introduces functionality to mitigate a potential issue could potentially aid an attacker in executing a DNS rebinding attack. For more information, see the following Adobe Developer Center article. (CVE-2007-5275)
This update introduces a new, stricter method for Flash Player to interpret cross-domain policy files. These changes could help prevent privilege escalation attacks against web servers hosting Flash content and cross-domain policy files. For more information, see the following Adobe Developer Center article. (CVE-2007- 6243)
This update restricts the unsupported asfunction: protocol to address potential cross-site scripting issues with some SWF files. This issue is specific to Flash Player 8 and Flash Player 9 and does not affect Flash Player 7. (CVE-2007-6244)
This update makes changes to the navigateToURL function to prevent potential Universal Cross-Site Scripting attacks. This issue is specific to the Flash Player ActiveX Control and the Internet Explorer Browser. (CVE-2007-6244)
This update resolves an issue that could allow remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks. (CVE-2007-6245)
This update introduces functionality to mitigate a potential port-scanning issue. For more information, see the following Knowledgebase Article. (CVE-2007-4324)
The Linux update for Flash Player addresses a memory permissions issue that could lead to privilege escalation. (CVE-2007-6246)
The Mac update for Flash Player addresses the issue with Flash Player originally reported by Opera and described in Security Advisory APSA07-05. (CVE-2007-5476)
Affected software | Recommended player update | Availability |
---|---|---|
Flash Player 9.0.48.0 and earlier | 9.0.115.0 | Player Download Center |
Flash Player 9.0.48.0 and earlier - network distribution | 9.0.115.0 | Player Licensing |
Flash CS3 Professional | 9.0.115.0 | Flash Player 9 Update for Flash CS3 Professional |
Flash Player 9.0.48.0 and earlier for Linux | 9.0.115.0 | Player Download Center |
Flex 2.0 | 9.0.115.0 | Flash Debug Player Updater |
With this security bulletin, Adobe is retiring support of Adobe Flash Player 7 and will no longer provide security updates for Flash Player 7 after this release. Adobe’s support policy for Adobe Flash Player is to support the current and previous major release. Flash Player 7 was previously updated with security fixes as a courtesy to customers on Microsoft Windows 95, Microsoft Windows /NT and Macintosh Classic operating systems, which were dropped with the Flash Player 8 release in September 2005, and to Linux and Solaris customers prior to the availability of Flash Player 9. Users who wish to continue to use Adobe Flash Player 7, can find archived installers in the Archived Flash Player Technote.
Adobe would like to thank Tavis Ormandy and Will Drewry of the Google Security Team for reporting input validation errors and for working with us to help protect our mutual customers’ security. (CVE-2007- 4768)
Adobe would like to thank Aaron Portnoy of TippingPoint DVLabs for reporting an input validation error and for working with us to help protect our mutual customers’ security. (CVE-2007-6242)
Adobe would like to thank Dan Boneh, Adam Barth, Andrew Bortz, Collin Jackson, and Weidong Shao of Stanford University for reporting the DNS rebinding issue and for working with us to help protect our customers’ security. (CVE-2007-5275)
Adobe would like to thank Toshiharu Sugiyama of UBsecure, Inc. and JPCERT/CC for reporting the cross-domain policy file issue and the HTTP header issue and for working with us to help protect our mutual customers’ security. (CVE-2007- 6243, CVE-2007- 6245)
Adobe would like to thank Rich Cannings of the Google Security Team for reporting the asfunction: issue and for working with us to help protect our mutual customers’ security. (CVE-2007- 6244)
Adobe would like to thank Collin Jackson and Adam Barth of Stanford University for reporting the navigateToURL issue and for working with us to help protect our customers’ security. (CVE-2007- 6244)
Adobe would like to thank Jesse Michael and Thomas Biege of SUSE for reporting the privilege escalation issues with the Linux version of Flash Player and for working with us to help protect our customers' security. (CVE-2007-6246)
Adobe would like to thank Opera for reporting the issue with the Mac version of Flash Player and for working with us to help protect our mutual customers' security. (CVE-2007-5476)
By using software of Adobe Systems Incorporated or its subsidiaries ("Adobe"); you agree to the following terms and conditions. If you do not agree with such terms and conditions; do not use the software. The terms of an end user license agreement accompanying a particular software file upon installation or download of the software shall supersede the terms presented below.
The export and re-export of Adobe software products are controlled by the United States Export Administration Regulations and such software may not be exported or re-exported to Cuba; Iran; Iraq; Libya; North Korea; Sudan; or Syria or any country to which the United States embargoes goods. In addition; Adobe software may not be distributed to persons on the Table of Denial Orders; the Entity List; or the List of Specially Designated Nationals.
By downloading or using an Adobe software product you are certifying that you are not a national of Cuba; Iran; Iraq; Libya; North Korea; Sudan; or Syria or any country to which the United States embargoes goods and that you are not a person on the Table of Denial Orders; the Entity List; or the List of Specially Designated Nationals.
If the software is designed for use with an application software product (the "Host Application") published by Adobe; Adobe grants you a non-exclusive license to use such software with the Host Application only; provided you possess a valid license from Adobe for the Host Application. Except as set forth below; such software is licensed to you subject to the terms and conditions of the End User License Agreement from Adobe governing your use of the Host Application.
DISCLAIMER OF WARRANTIES: YOU AGREE THAT ADOBE HAS MADE NO EXPRESS WARRANTIES TO YOU REGARDING THE SOFTWARE AND THAT THE SOFTWARE IS BEING PROVIDED TO YOU "AS IS" WITHOUT WARRANTY OF ANY KIND. ADOBE DISCLAIMS ALL WARRANTIES WITH REGARD TO THE SOFTWARE; EXPRESS OR IMPLIED; INCLUDING; WITHOUT LIMITATION; ANY IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE; MERCHANTABILITY; MERCHANTABLE QUALITY OR NONINFRINGEMENT OF THIRD PARTY RIGHTS. Some states or jurisdictions do not allow the exclusion of implied warranties; so the above limitations may not apply to you.
LIMIT OF LIABILITY: IN NO EVENT WILL ADOBE BE LIABLE TO YOU FOR ANY LOSS OF USE; INTERRUPTION OF BUSINESS; OR ANY DIRECT; INDIRECT; SPECIAL; INCIDENTAL; OR CONSEQUENTIAL DAMAGES OF ANY KIND (INCLUDING LOST PROFITS) REGARDLESS OF THE FORM OF ACTION WHETHER IN CONTRACT; TORT (INCLUDING NEGLIGENCE); STRICT PRODUCT LIABILITY OR OTHERWISE; EVEN IF ADOBE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Some states or jurisdictions do not allow the exclusion or limitation of incidental or consequential damages; so the above limitation or exclusion may not apply to you.
January 29, 2008 Security bulletin updated due to availability of Solaris version
December 18, 2007 Security bulletin first created