Secunia Advisory: SA22467
Release Date: 2006-10-19
Critical: Less critical
Impact: Security Bypass
Where: From remote
Solution Status: Unpatched
Software: Adobe Flash Player 9.x
Macromedia Flash Player 7.x
Macromedia Flash Player 8.x
CVE reference: CVE-2006-5330 (Secunia mirror)
This advisory is currently marked as unpatched!
- Companies can be alerted when a patch is released!
Description:
Rapid7 has reported some vulnerabilities in Adobe Flash Player, which can be exploited by malicious people to bypass certain restrictions.
Input passed to the "XML.addRequestHeader()" ActionScript function and the "XML.contentType" attribute is not properly sanitised before being used. This can be exploited to bypass certain restrictions via CRLF character sequences and inject arbitrary HTTP headers in a request.
Successful exploitation may e.g. make it easier to perform CSRF (Cross-Site Request Forgery) attacks.
The vulnerabilities are reported in version 9.0.16 for Windows and 7.0.63 for Linux. According to the vendor, all current versions from 7.x through 9.x are affected.
Solution:
The vendor is currently working on a fixed version.
Bollettino di Sicurezza
Release Date: 2006-10-19
Critical: Less critical
Impact: Security Bypass
Where: From remote
Solution Status: Unpatched
Software: Adobe Flash Player 9.x
Macromedia Flash Player 7.x
Macromedia Flash Player 8.x
CVE reference: CVE-2006-5330 (Secunia mirror)
This advisory is currently marked as unpatched!
- Companies can be alerted when a patch is released!
Description:
Rapid7 has reported some vulnerabilities in Adobe Flash Player, which can be exploited by malicious people to bypass certain restrictions.
Input passed to the "XML.addRequestHeader()" ActionScript function and the "XML.contentType" attribute is not properly sanitised before being used. This can be exploited to bypass certain restrictions via CRLF character sequences and inject arbitrary HTTP headers in a request.
Successful exploitation may e.g. make it easier to perform CSRF (Cross-Site Request Forgery) attacks.
The vulnerabilities are reported in version 9.0.16 for Windows and 7.0.63 for Linux. According to the vendor, all current versions from 7.x through 9.x are affected.
Solution:
The vendor is currently working on a fixed version.
Bollettino di Sicurezza