lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <46a111c3.CTqsyNBWsmLL67T8%foresight-security-noreply@foresightlinux.org>
Date: Fri, 20 Jul 2007 15:49:23 -0400
From: Foresight Linux Essential Announcement Service <foresight-security-noreply@...esightlinux.org>
To: foresight-security-announce@...ts.rpath.org
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
	lwn@....net
Subject: FLEA-2007-0032-1: flashplayer 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Foresight Linux Essential Advisory: 2007-0032-1
Published: 2007-07-20

Rating: Major

Updated Versions:
    flashplayer=/zaphod.rpath.org@zap:1/9.0.48.0-2-1
    group-dist=/foresight.rpath.org@fl:1-devel//1/1.3.2-0.5-2

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3456

Description:
    Previous versions of the flashplayer package are vulnerable to a buffer
    overflow attack caused by an input validation error. An attacker may use
    malformed or malicious SWF or FLV files to execute arbitrary code as the
    user of the flashplayer application. Because most flash content is provided
    by web-pages, this is effectively a remote vulnerability, but can be
    mitigated if the user disables flash in the browser.

- ---

Copyright 2007 Foresight Linux Project
This file is distributed under the terms of the MIT License.
A copy is available at http://www.foresightlinux.org/permanent/mit-license.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.4 (GNU/Linux)
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=d29Z
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ