JVN#50876069
Flash Player allows to send arbitrary HTTP headers
Overview
Adobe Flash Player contains a vulnerability that could allow a remote attacker to modify HTTP headers of client requests and conduct a HTTP request splitting attack.
Products Affected
- Flash Player 7.0.70.0 and earlier
- Flash Player 8.0.35.0 and earlier
- Flash Player 9.0.48.0 and earlier
Description
Adobe Flash Player is a player for the Flash media format and enables frame-based animations with sound to be viewed within a web browser.
Flash Player contains a vulnerability that could allow a remote attacker to modify HTTP headers of client requests and conduct a HTTP request splitting attack.
This vulnerability is different from JVN#72595280.
Impact
As Flash Player can send an arbitrary HTTP header, a remote attacker could bypass a security measure applied on a web application based on HTTP headers, if a user views a specially crafted Flash content.
Solution
Update the Software
For Flash Player 8.x or Flash Player 9.x
Apply the latest updates provided by the vendor.
Apply the Patch
For Flash Player 7.x
Apply the appropriate patch as specified in the Flash Player update TechNote provided by the vendor.
The vendor has announced that they discontinued the support of Flash Player 7.x and will no longer provide security updates after this update. Those who are unable to upgrade to Flash Player 8.x or 9.x and wish to continue to use Flash Player 7.x can find the archived installers in the Archived Flash Player TechNote.
For more information, refer to the vendor's website
Vendor Status
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2007.12.12
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file |
|
Exploit Complexity | Low-Medium - some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Toshiharu Sugiyama of UBsecure, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2007-6245 |
JVN iPedia |
JVNDB-2007-000818 |