HTTP: Adobe Flash Player JPG Embedded SWF Processing Heap Overflow

This signature detects attempts to exploit a known buffer overflow vulnerability in Adobe Flash Player in the way it processes SWF files embedding JPG images. It is due to lack of input validation while parsing height and width fields in the JPG header. A remote attacker can exploit this by enticing the target user to open malicious SWF files, potentially causing arbitrary code to be injected and executed in the security context of the logged-in user.

Extended Description

Adobe Flash Player is prone to a remote heap-based buffer-overflow vulnerability because the application fails to use consistent signedness when handling user-supplied input. An attacker can exploit this issue to execute arbitrary code with the privileges of a user running the application. Failed exploit attempts will likely cause denial-of-service conditions. This issue affects Adobe Flash Player 9.0.48.0, 8.0.35.0, 7.0.70.0, and prior versions. NOTE: This issue was originally covered by BID 26929 (Adobe Flash Player Multiple Security Vulnerabilities).

Affected Products

Adobe flash_player

References

BugTraq: 26951

CVE: CVE-2007-6242

Short Name
HTTP:STC:ADOBE:SWF-JPG-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Adobe CVE-2007-6242 Embedded Flash Heap JPG Overflow Player Processing SWF bid:26951
Release Date
10/08/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Suse

Gentoo

Sun

Turbolinux

Nortel_networks

Adobe

CVSS Score

6.8

Found a potential security threat?