Everyone is advised to update their Adobe Flash player to the latest version 184.108.40.206 by downloading on their official site. to address security vulnerabilities. Details after the jump
Vulnerability identifier: APSB08-11
CVE number: CVE-2007-5275, CVE-2007-6243, CVE-2007-6637, CVE-2007-6019, CVE-2007-0071, CVE-2008-1655, CVE-2008-1654
Platform: All platforms
Critical vulnerabilities have been identified in Adobe Flash Player that could allow an attacker who successfully exploits these potential vulnerabilities to take control of the affected system. A malicious SWF must be loaded in Flash Player by the user for an attacker to exploit these potential vulnerabilities. It is recommended users update to the most current version of Flash Player available for their operating system.
Due to the possibility that these security enhancements and changes may impact existing Flash content, content developers are advised to review this March 2008 Adobe Developer Center article to determine if the changes will affect their content, and to begin implementing necessary changes immediately to help ensure a seamless transition.
Affected software versions
Adobe Flash Player 220.127.116.11 and earlier, and 18.104.22.168 and earlier.
To verify the Adobe Flash Player version number, access the About Flash Player page, or right-click on Flash content and select “About Adobe (or Macromedia) Flash Player” from the menu. Customers using multiple browsers are advised to perform the check for each browser installed on their system.
Adobe recommends all users of Adobe Flash Player 22.214.171.124 and earlier versions upgrade to the newest version 126.96.36.199, by downloading it from the Player Download Center, or by using the auto-update mechanism within the product when prompted.
Adobe categorizes this as a critical update and recommends affected users upgrade to version 188.8.131.52.
This update addresses input validation errors which have been identified in Flash Player 184.108.40.206 and earlier versions that could lead to the potential execution of arbitrary code. These vulnerabilities could be accessed through content delivered from a remote location via the user’s web browser, email client, or other applications that include or reference the Flash Player. (CVE-2007-0071, CVE-2007-6019)
NOTE: There are reports that the issue identified as CVE-2007-0071 is being exploited in the wild.
This update introduces functionality to mitigate potential issues that could aid an attacker in executing a DNS rebinding attack. For more information, see the following Adobe Developer Center article. (CVE-2007-5275, CVE-2008-1655)
This update introduces a new, more conservative method for Flash Player to interpret cross-domain policy files. These changes could help prevent privilege escalation attacks against web servers hosting Flash content and cross-domain policy files. For more information, see the following Adobe Developer Center article. (CVE-2007-6243)
This update adds a new security feature to perform a cross-domain policy file check before allowing SWFs to send HTTP headers to another domain. This change helps improve web site security by helping to defend against malicious HTTP headers sent by content from other domains. For more information, see the following TechNote. (CVE-2008-1654)
Due to the possibility that these security enhancements and changes may impact existing Flash content, customers are advised to review this March 2008 Adobe Developer Center article to determine if the changes will affect their content, and to begin implementing necessary changes immediately to help ensure a seamless transition.
Customers for whom the following situations apply should read the article in detail:
– Use of sockets or XMLSockets, regardless of the domain to which the SWF is connecting.
– Use of addRequestHeader or URLRequest.requestHeaders in any network API call when sending or loading data cross-domain OR Provides access to content on remote domains as a web service provider.
– Use of SWFs that are exported for Flash Player 7 (SWF7) or below that communicate with the hosting HTML by any means.