Vulnerabilities > CVE-2009-0522 - Unspecified vulnerability in Adobe products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
adobe
nessus

Summary

Adobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 on Windows allows remote attackers to trick a user into visiting an arbitrary URL via an unspecified manipulation of the "mouse pointer display," related to a "Clickjacking attack."

Vulnerable Configurations

Part Description Count
Application
Adobe
88
OS
Microsoft
1

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2009-0334.NASL
    descriptionAn updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 3 and 4 Extras. This update has been rated as having critical security impact by the Red Hat Security Response Team. The flash-plugin package contains a Firefox-compatible Adobe Flash Player Web browser plug-in. Multiple input validation flaws were found in the way Flash Player displayed certain SWF (Shockwave Flash) content. An attacker could use these flaws to create a specially crafted SWF file that could cause flash-plugin to crash, or, possibly, execute arbitrary code when the victim loaded a page containing the specially crafted SWF content. (CVE-2009-0520, CVE-2009-0519) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 9.0.159.0.
    last seen2020-06-01
    modified2020-06-02
    plugin id63873
    published2013-01-24
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/63873
    titleRHEL 3 / 4 : flash-plugin (RHSA-2009:0334)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2009-0332.NASL
    descriptionAn updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 5 Supplementary. This update has been rated as having critical security impact by the Red Hat Security Response Team. The flash-plugin package contains a Firefox-compatible Adobe Flash Player Web browser plug-in. Multiple input validation flaws were found in the way Flash Player displayed certain SWF (Shockwave Flash) content. An attacker could use these flaws to create a specially crafted SWF file that could cause flash-plugin to crash, or, possibly, execute arbitrary code when the victim loaded a page containing the specially crafted SWF content. (CVE-2009-0520, CVE-2009-0519) It was discovered that Adobe Flash Player had an insecure RPATH (runtime library search path) set in the ELF (Executable and Linking Format) header. A local user with write access to the directory pointed to by RPATH could use this flaw to execute arbitrary code with the privileges of the user running Adobe Flash Player. (CVE-2009-0521) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 10.0.22.87.
    last seen2020-06-01
    modified2020-06-02
    plugin id63872
    published2013-01-24
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63872
    titleRHEL 5 : flash-plugin (RHSA-2009:0332)
  • NASL familyWindows
    NASL idFLASH_PLAYER_APSB09_01.NASL
    descriptionThe remote Windows host contains a version of Adobe Flash Player that is earlier than 9.0.159.0 / 10.0.22.87. Such versions are reportedly affected by multiple vulnerabilities : - A buffer overflow issue that could allow an attacker to execute arbitrary code with the privileges of the user running the application. (CVE-2009-0520) - An input validation vulnerability that leads to a denial of service attack and could possibly allow for an attacker to execute arbitrary code. (CVE-2009-0519) - A vulnerability in the Flash Player settings manager that could contribute to a clickjacking attack. (CVE-2009-0014) - A vulnerability with the mouse pointer display that could contribute to a clickjacking attack. (CVE-2009-0522)
    last seen2020-06-01
    modified2020-06-02
    plugin id35742
    published2009-02-26
    reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/35742
    titleFlash Player 9.0.159.0 / 10.0.22.87 Multiple Vulnerabilities (APSB09-01)

Oval

accepted2015-03-16T04:01:58.315-04:00
classvulnerability
contributors
  • namePrabhu S A
    organizationSecPod Technologies
  • nameJ. Daniel Brown
    organizationDTCC
  • nameShane Shaffer
    organizationG2, Inc.
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameMaria Kedovskaya
    organizationALTX-SOFT
  • nameMaria Mikhno
    organizationALTX-SOFT
  • nameMaria Mikhno
    organizationALTX-SOFT
definition_extensions
  • commentAdobe Flash Player is installed
    ovaloval:org.mitre.oval:def:6700
  • commentAdobe AIR is installed
    ovaloval:org.mitre.oval:def:7479
descriptionAdobe Flash Player 9.x before 9.0.159.0 and 10.x before 10.0.22.87 on Windows allows remote attackers to trick a user into visiting an arbitrary URL via an unspecified manipulation of the "mouse pointer display," related to a "Clickjacking attack."
familywindows
idoval:org.mitre.oval:def:6674
statusaccepted
submitted2009-11-30T03:25:55
titleAdobe Flash Player Mouse Pointer Display Issue May Let Remote Users Conduct Clickjacking Attacks
version62