fkie_cve-2007-4324
Vulnerability from fkie_nvd
Published
2007-08-14 00:17
Modified
2025-04-09 00:30
Severity ?
Summary
ActionScript 3 (AS3) in Adobe Flash Player 9.0.47.0, and other versions and other 9.0.124.0 and earlier versions, allows remote attackers to bypass the Security Sandbox Model, obtain sensitive information, and port scan arbitrary hosts via a Flash (SWF) movie that specifies a connection to make, then uses timing discrepancies from the SecurityErrorEvent error to determine whether a port is open or not. NOTE: 9.0.115.0 introduces support for a workaround, but does not fix the vulnerability.
References
cve@mitre.orghttp://kb.adobe.com/selfservice/viewContent.do?externalId=kb402956&sliceId=2
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
cve@mitre.orghttp://scan.flashsec.org/
cve@mitre.orghttp://secunia.com/advisories/28157Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28161Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28213
cve@mitre.orghttp://secunia.com/advisories/28570
cve@mitre.orghttp://secunia.com/advisories/30507
cve@mitre.orghttp://secunia.com/advisories/32270
cve@mitre.orghttp://secunia.com/advisories/32448
cve@mitre.orghttp://secunia.com/advisories/32702
cve@mitre.orghttp://secunia.com/advisories/32759
cve@mitre.orghttp://secunia.com/advisories/33390
cve@mitre.orghttp://securityreason.com/securityalert/2995
cve@mitre.orghttp://securitytracker.com/id?1019116
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
cve@mitre.orghttp://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
cve@mitre.orghttp://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
cve@mitre.orghttp://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html
cve@mitre.orghttp://www.adobe.com/support/security/bulletins/apsb07-20.html
cve@mitre.orghttp://www.adobe.com/support/security/bulletins/apsb08-18.html
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200801-07.xml
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2007-1126.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0945.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2008-0980.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/475961/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/25260
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA07-355A.htmlUS Government Resource
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/4258
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1724/references
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2838
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11874
af854a3a-2127-422b-91ae-364da2661108http://kb.adobe.com/selfservice/viewContent.do?externalId=kb402956&sliceId=2
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://scan.flashsec.org/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28157Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28161Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28213
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28570
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30507
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32270
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32448
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32702
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32759
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33390
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/2995
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1019116
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm
af854a3a-2127-422b-91ae-364da2661108http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=834256&poid=
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/bulletins/apsb07-20.html
af854a3a-2127-422b-91ae-364da2661108http://www.adobe.com/support/security/bulletins/apsb08-18.html
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1126.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0945.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2008-0980.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/475961/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25260
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-355A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4258
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1724/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2838
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11874
Impacted products
Vendor Product Version
adobe flash_player *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0365260-6FAE-4605-BA4F-6F363EA7B565",
              "versionEndIncluding": "9.0.114.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ActionScript 3 (AS3) in Adobe Flash Player 9.0.47.0, and other versions and other 9.0.124.0 and earlier versions, allows remote attackers to bypass the Security Sandbox Model, obtain sensitive information, and port scan arbitrary hosts via a Flash (SWF) movie that specifies a connection to make, then uses timing discrepancies from the SecurityErrorEvent error to determine whether a port is open or not.  NOTE: 9.0.115.0 introduces support for a workaround, but does not fix the vulnerability."
    },
    {
      "lang": "es",
      "value": "ActionScript versi\u00f3n 3 (AS3) en Adobe Flash Player versiones 9.0.47.0 y 9.0.124.0 y anteriores, permite a atacantes remotos omitir el Security Sandbox Model, obtener informaci\u00f3n confidencial y analizar puertos hosts arbitrarios por medio de una pel\u00edcula Flash (SWF) que especifica una conexi\u00f3n a realizar y, a continuaci\u00f3n, usa discrepancias de tiempo del error SecurityErrorEvent para determinar si un puerto est\u00e1 abierto o no. NOTA: la versi\u00f3n 9.0.115.0 introduce soporte para una soluci\u00f3n alternativa, pero no corrige esta vulnerabilidad."
    }
  ],
  "id": "CVE-2007-4324",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-14T00:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://kb.adobe.com/selfservice/viewContent.do?externalId=kb402956\u0026sliceId=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://scan.flashsec.org/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28157"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28161"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28213"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28570"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/30507"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32270"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32448"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32702"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32759"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33390"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2995"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1019116"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026DocumentOID=834256\u0026poid="
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/475961/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/25260"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/4258"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1724/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2838"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11874"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kb.adobe.com/selfservice/viewContent.do?externalId=kb402956\u0026sliceId=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://scan.flashsec.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28161"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28213"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28570"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32448"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32702"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2995"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1019116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-248586-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-440.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-020.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL\u0026DocumentOID=834256\u0026poid="
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.adobe.com/devnet/flashplayer/articles/fplayer10_security_changes.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.adobe.com/support/security/bulletins/apsb07-20.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.adobe.com/support/security/bulletins/apsb08-18.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1126.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0945.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2008-0980.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/475961/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25260"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-355A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4258"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1724/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11874"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…