Adobe Flash Player Plugin HTTP报头跨站脚本请求伪造漏洞

admin 2023-12-14 01:05:11 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
中危 Adobe Flash Player Plugin HTTP报头跨站脚本请求伪造漏洞

CVE编号

CVE-2006-5330

利用情况

暂无

补丁情况

官方补丁

披露时间

2006-10-18
漏洞描述
CRLF injection vulnerability in Adobe Flash Player plugin 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, 7.x before 7.0 r67 for Solaris, and before 9.0.28.0 for Mac OS X, allows remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks via CRLF sequences in arguments to the ActionScript functions (1) XML.addRequestHeader and (2) XML.contentType. NOTE: the flexibility of the attack varies depending on the type of web browser being used.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://docs.info.apple.com/article.html?artnum=305214
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0006.html
http://secunia.com/advisories/22467
http://secunia.com/advisories/23324
http://secunia.com/advisories/23581
http://secunia.com/advisories/24479
http://secunia.com/advisories/25467
http://securityreason.com/securityalert/1737
http://securitytracker.com/id?1017078
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102932-1
http://www.adobe.com/support/security/advisories/apsa06-01.html
http://www.adobe.com/support/security/bulletins/apsb06-18.html
http://www.osvdb.org/29863
http://www.rapid7.com/advisories/R7-0026.jsp
http://www.redhat.com/support/errata/RHSA-2007-0009.html
http://www.securityfocus.com/archive/1/448997/100/0/threaded
http://www.securityfocus.com/bid/20592
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
http://www.vupen.com/english/advisories/2006/4094
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2007/1999
https://exchange.xforce.ibmcloud.com/vulnerabilities/29634
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 adobe flash_player * Up to (including) 7.0.63
运行在以下环境
应用 adobe flash_player * Up to (including) 7.0_r67
运行在以下环境
应用 adobe flash_player * Up to (including) 9.0.16
运行在以下环境
应用 adobe flash_player * Up to (including) 9.0.28.0
运行在以下环境
系统 suse_10 NetworkManager-kde * Up to (excluding) 0.1r588481-1.17
阿里云评分 5.0
  • 攻击路径 本地
  • 攻击复杂度 困难
  • 权限要求 普通权限
  • 影响范围 有限影响
  • EXP成熟度 未验证
  • 补丁情况 官方补丁
  • 数据保密性 无影响
  • 数据完整性 N/A
  • 服务器危害 无影响
  • 全网数量 N/A
CWE-ID 漏洞类型
CWE-79 在Web页面生成时对输入的转义处理不恰当(跨站脚本)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0