Overview
Adobe Flash contains a vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. Adobe Flash Player, Reader, Acrobat, and other products that include Flash support are affected.
Description
Adobe Flash is a widely deployed multimedia platform typically used to provide content in web sites. Adobe Flash Player, Reader, Acrobat, and other Adobe products include Flash support. Adobe Flash Player contains a code execution vulnerability. An attacker may be able to trigger this vulnerability by convincing a user to open a specially crafted Flash (SWF) file. The SWF file could be hosted or embedded in a web page or contained in a Portable Document Format (PDF) file. If an attacker can take control of a website or web server, trusted sites may exploit this vulnerability. |
Impact
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), PDF file, Microsoft Office document, or any other document that supports embedded SWF content, an attacker may be able to execute arbitrary code. |
Solution
Apply an update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 0 | AV:--/AC:--/Au:--/C:--/I:--/A:-- |
Temporal | 0 | E:ND/RL:ND/RC:ND |
Environmental | 0 | CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND |
References
- http://www.adobe.com/support/security/bulletins/apsb09-10.html
- http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html
- http://blogs.adobe.com/psirt/2009/07/update_on_adobe_reader_acrobat.html
- http://www.adobe.com/support/security/advisories/apsa09-03.html
- http://bugs.adobe.com/jira/browse/FP-1265
- http://www.symantec.com/connect/blogs/next-generation-flash-vulnerability
- http://kb2.adobe.com/cps/141/tn_14157.html
- http://blog.fireeye.com/research/2009/07/actionscript_heap_spray.html
- http://blogs.technet.com/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx
- http://blogs.technet.com/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx
Acknowledgements
This vulnerability was reported on the Adobe PSIRT blog. Thanks to Department of Defense Cyber Crime Center/DCISE for information used in this document.
This document was written by Chris Taschner, Will Dormann, Chad Dougherty, and Art Manion.
Other Information
CVE IDs: | CVE-2009-1862 |
Severity Metric: | 35.34 |
Date Public: | 2009-07-22 |
Date First Published: | 2009-07-22 |
Date Last Updated: | 2009-08-07 14:30 UTC |
Document Revision: | 51 |