Adobe Flash Player may load arbitrary, malformed cross-domain policy files. This could allow an attacker to control cross-domain data loading, potentially allowing the attacker to gain access to sensitive information or to manipulate content in other domains.
Adobe Flash Player is a widely deployed application for multimedia viewing on the internet. A vulnerability exists in the way that Flash Player handles cross-domain policy files. An attacker could use a specially crafted cross-domain policy file to circumvent a site's Flash content data loading security polices.
From Security changes in Flash Player 9:
A remote, unauthenticated attacker may be able to conduct cross-domain and cross-site scripting attacks on sites hosting Flash content. This could allow the attacker to read data or modify Flash content, possibly gaining access to sensitive information or spoofing web site content.
Adobe has released an update for Flash Player to address this vulnerability. Please see Adobe Security bulletin APSB07-20.
Limit access to Flash files
Adobe credits Toshiharu Sugiyama of UBsecure, Inc. and JPCERT/CC for reporting this vulnerability.
This document was written by Dean Reges and Art Manion.
|Date First Published:||2008-03-25|
|Date Last Updated:||2008-03-25 12:14 UTC|