Vulnerability Note VU#730785

Adobe Flash Player FLV integer overflow

Original Release date: 11 Jul 2007 | Last revised: 15 Nov 2007

Overview

A vulnerability in the Adobe Flash Player could allow a remote attacker to execute arbitrary code on an affected system.

Description

Adobe Flash Player is a player for the Flash media format and enables frame-based animations with sound to be viewed within a web browser. An integer overflow vulnerability exists in the way some versions of the Flash Player handle Flash Video (.flv) media. This vulnerability could be exploited by an attacker with the ability to supply specially crafted media content to a user’s web browser, email client, or other applications that include or reference the Flash Player.

Impact

A remote unauthenticated attacker may be able to execute arbitrary code on an affected system. The attacker-supplied code would be executed with the privileges of the user running the vulnerable software component.

Solution

Apply a patch

Updated versions of the affected software have been published to address this issue. Please see the Systems Affected section of this document for more information.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
AdobeAffected-26 Sep 2007
Apple Computer, Inc.Affected26 Sep 200726 Sep 2007
Gentoo LinuxAffected-26 Sep 2007
Red Hat, Inc.Affected-26 Sep 2007
SUSE LinuxAffected-26 Sep 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was publicly reported in Adobe Product Security Bulletin APSB07-12. Adobe, in turn, credits Stefano DiPaola, Elia Florio and Giorgio Fedon with reporting this issue to them.

This document was written by Chad R Dougherty.

Other Information

  • CVE IDs: CVE-2007-3456
  • Date Public: 10 Jul 2007
  • Date First Published: 11 Jul 2007
  • Date Last Updated: 15 Nov 2007
  • Severity Metric: 28.69
  • Document Revision: 17

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.