---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Adobe Flash CS3 SWF Processing Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA32246 VERIFY ADVISORY: http://secunia.com/advisories/32246/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote SOFTWARE: Adobe Flash CS3 http://secunia.com/advisories/product/14231/ Macromedia Flash MX 2004 http://secunia.com/advisories/product/3192/ DESCRIPTION: Some vulnerabilities have been reported in Adobe Flash CS3, which potentially can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused due to boundary errors while processing overly long SWF control parameters. These can be exploited to cause heap-based buffer overflows via specially crafted SWF files. NOTE: Reportedly, the vulnerabilities do not affect the Mac version of Adobe Flash CS3. SOLUTION: Do not open untrusted SWF files. Reportedly, the vulnerabilities do not affect Adobe Flash CS4. PROVIDED AND/OR DISCOVERED BY: Paul Craig, Security-Assessment.com. ORIGINAL ADVISORY: Adobe: http://www.adobe.com/support/security/advisories/apsa08-09.html Security-Assessment.com: http://security-assessment.com/files/advisories/2008-10-16_Multiple_Flash_Authoring_Heap_Overflows.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------