Vulnerabilities > CVE-2008-4819 - Multiple Security vulnerability in Adobe Flash Player
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Unspecified vulnerability in Adobe Flash Player 9.0.124.0 and earlier makes it easier for remote attackers to conduct DNS rebinding attacks via unknown vectors.
Vulnerable Configurations
Nessus
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2008-0945.NASL description An updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 5 Supplementary. This update has been rated as having critical security impact by the Red Hat Security Response Team. [Updated 18th November 2008] The erratum has been updated to include references to the additional CVE-named issues that were not public at the time of release. The security impact of the erratum has also been upgraded to Critical. No changes have been made to the packages. The flash-plugin package contains a Firefox-compatible Adobe Flash Player Web browser plug-in. A flaw was found in the way Adobe Flash Player wrote content to the clipboard. A malicious SWF file could populate the clipboard with a URL that could cause the user to mistakenly load an attacker-controlled URL. (CVE-2008-3873) A flaw was found which allowed Adobe Flash Player last seen 2020-06-01 modified 2020-06-02 plugin id 63869 published 2013-01-24 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/63869 title RHEL 5 : flash-plugin (RHSA-2008:0945) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2008-0980.NASL description An updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 3 and 4 Extras. This update has been rated as having critical security impact by the Red Hat Security Response Team. [Updated 18th November 2008] This erratum has been updated to include a reference to the additional CVE-named issue that was not public at the time of release. The security impact of the erratum has also been upgraded to Critical. No changes have been made to the packages. The flash-plugin package contains a Firefox-compatible Adobe Flash Player Web browser plug-in. A flaw was found in the way Adobe Flash Player wrote content to the clipboard. A malicious SWF (Shockwave Flash) file could populate the clipboard with a URL that could cause the user to accidentally or mistakenly load an attacker-controlled URL. (CVE-2008-3873) A flaw was found with Adobe last seen 2020-06-01 modified 2020-06-02 plugin id 63870 published 2013-01-24 reporter This script is Copyright (C) 2013-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/63870 title RHEL 3 / 4 : flash-plugin (RHSA-2008:0980) NASL family MacOS X Local Security Checks NASL id MACOSX_10_5_6.NASL description The remote host is running a version of Mac OS X 10.5.x that is prior to 10.5.6. Mac OS X 10.5.6 contains security fixes for the following products : - ATS - BOM - CoreGraphics - CoreServices - CoreTypes - Flash Player Plug-in - Kernel - Libsystem - Managed Client - network_cmds - Podcast Producer - UDF last seen 2020-06-01 modified 2020-06-02 plugin id 35111 published 2008-12-16 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35111 title Mac OS X 10.5.x < 10.5.6 Multiple Vulnerabilities NASL family Windows NASL id ADOBE_AIR_APSB08-23.NASL description According to its version number, an instance of Adobe AIR on the remote Windows host is 1.1 or earlier. Such versions are potentially affected by several vulnerabilities (APSB08-23 / APSB08-22 / APSB08-20 / APSB08-18): - A potential port-scanning issue. (CVE-2007-4324) - Possible privilege escalation attacks against web servers hosting Flash content and cross-domain policy files. (CVE-2007-6243) - Potential Clipboard attacks. (CVE-2008-3873) - FileReference upload and download APIs that don last seen 2020-06-01 modified 2020-06-02 plugin id 34815 published 2008-11-18 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/34815 title Adobe AIR < 1.5 Multiple Vulnerabilities (APSB08-23) NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200903-23.NASL description The remote host is affected by the vulnerability described in GLSA-200903-23 (Adobe Flash Player: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Flash Player: The access scope of SystemsetClipboard() allows ActionScript programs to execute the method without user interaction (CVE-2008-3873). The access scope of FileReference.browse() and FileReference.download() allows ActionScript programs to execute the methods without user interaction (CVE-2008-4401). The Settings Manager controls can be disguised as normal graphical elements. This so-called last seen 2020-06-01 modified 2020-06-02 plugin id 35904 published 2009-03-11 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35904 title GLSA-200903-23 : Adobe Flash Player: Multiple vulnerabilities NASL family Windows NASL id FLASH_PLAYER_APSB08-20.NASL description According to its version number, an instance of Flash Player on the remote Windows host is 9.0.124.0 or earlier. Such versions are potentially affected by several vulnerabilities : - A potential port-scanning issue. (CVE-2007-4324) - Possible privilege escalation attacks against web servers hosting Flash content and cross-domain policy files. (CVE-2007-6243) - Potential Clipboard attacks. (CVE-2008-3873) - FileReference upload and download APIs that don last seen 2020-06-01 modified 2020-06-02 plugin id 34741 published 2008-11-11 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/34741 title Flash Player < 9.0.151.0 / 10.0.12.36 Multiple Vulnerabilities (APSB08-18 / APSB08-20 / APSB08-22) NASL family MacOS X Local Security Checks NASL id MACOSX_SECUPD2008-008.NASL description The remote host is running a version of Mac OS X 10.4 that does not have Security Update 2008-008 applied. This security update contains fixes for the following products : - BOM - CoreGraphics - CoreServices - Flash Player Plug-in - Libsystem - network_cmds - UDF last seen 2020-06-01 modified 2020-06-02 plugin id 35110 published 2008-12-16 reporter This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/35110 title Mac OS X Multiple Vulnerabilities (Security Update 2008-008)
Redhat
advisories |
| ||||
rpms |
|
References
- http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
- http://secunia.com/advisories/32702
- http://secunia.com/advisories/33179
- http://secunia.com/advisories/33390
- http://secunia.com/advisories/34226
- http://security.gentoo.org/glsa/glsa-200903-23.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
- http://support.apple.com/kb/HT3338
- http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
- http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
- http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
- http://www.adobe.com/support/security/bulletins/apsb08-20.html
- http://www.redhat.com/support/errata/RHSA-2008-0980.html
- http://www.securityfocus.com/bid/32129
- http://www.securitytracker.com/id?1021147
- http://www.us-cert.gov/cas/techalerts/TA08-350A.html
- http://www.vupen.com/english/advisories/2008/3444
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46532