Overview
The Adobe Flash player asfunction protocol could allow an attacker to conduct cross-site scripting attacks on websites that host vulnerable Flash files.
Description
The Adobe Flash Player is a player for the Flash media format and enables frame-based animations and multimedia to be viewed within a web browser. ActionScript is a scripting language that is used to develop software and multimedia files that are processed by the Adobe Flash Player. The asfunction protocol enables HTTP hyperlinks in Flash files to launch a ActionScript functions. Per Adobe Security Bulletin APSB07-20: |
Impact
A remote, unauthenticated attacker may be able to launch cross-site scripting attacks against sites that host vulnerable Flash files. |
Solution
Update Flash Player |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://www.adobe.com/support/security/bulletins/apsb07-20.html
- http://www.adobe.com/support/flash/action_scripts/actionscript_dictionary/actionscript_dictionary073.html
- http://www.adobe.com/products/flashplayer/
- http://www.adobe.com/devnet/actionscript/
- http://noscript.net/
- http://noscript.net/features#contentblocking
- http://www.adobe.com/licensing/developer/fileformat/faq/
- http://www.us-cert.gov/reading_room/securing_browser/
- http://www.protocolsolutions.co.uk/wordpress/?cat=4
Acknowledgements
Adobe credits Rich Cannings of the Google Security Team for reporting this issue.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2007-6244 |
Severity Metric: | 14.58 |
Date Public: | 2007-12-19 |
Date First Published: | 2007-12-19 |
Date Last Updated: | 2008-01-15 13:52 UTC |
Document Revision: | 24 |