A buffer overflow vulnerability in some versions of the Macromedia Flash Player may allow a remote attacker to execute code on a vulnerable system.
The Macromedia Flash Player is a player for the Flash media format and enables frame-based animations with sound to be viewed within a web browser.
Some versions of the Flash Player, specifically 188.8.131.52 and earlier, contain an array bounds checking error in the way that they handle a frame type identifier read from the Flash (SWF) file. This error can results in a heap memory access vulnerability that could allow an attacker to execute arbitrary code. A maliciously crafted SWF that exploits this vulnerability could be supplied through a web page, for example.
A remote attacker with the ability to supply a specially crafted SWF file to a vulnerable host may be able to execute arbitrary code on that system. The attacker-supplied code would be executed with the privileges of the user opening the file.
Apply a patch
The CERT/CC credits eEye Digital Security and SEC Consult for reporting this vulnerability.
This document was written by Chad R Dougherty based on information provided by Macromedia, Inc. and eEye Digital Security.
|Date First Published:||2005-11-11|
|Date Last Updated:||2006-05-09 18:23 UTC|