// For flags

CVE-2007-0071

Adobe Flash DefineSceneAndFrameLabelData Parsing Memory Corruption Vulnerability

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow.

El desbordamiento de enteros en Adobe Flash Player versión 9.0.115.0 y versiones anteriores, y versión 8.0.39.0 y versiones anteriores, permite que los atacantes remotos ejecuten código arbitrario por medio de un archivo SWF creado con un valor de Scene Count negativo, que pasa por una comparación firmada, se utiliza como compensación de un puntero NULL, y se desencadena un desbordamiento de búfer.

TippingPoint Note: This issue was originally disclosed on April 8, 2008 as ZDI-08-022 but due to an error on our behalf the original advisory was clobbered and is now being re-released as ZDI-08-032.
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Adobe Flash Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the DLL responsible for parsing SWF tags. The vulnerable function trusts an offset present within the vulnerable tag and performs memory operations accordingly. By specifying certain values, an attacker is able to control a memory write leading to arbitrary code execution under the context of the currently logged in user.

*Credits: wushi of team509
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-01-04 CVE Reserved
  • 2008-04-09 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-09-11 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-189: Numeric Errors
CAPEC
References (34)
URL Tag Source
http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf Broken Link
http://isc.sans.org/diary.html?storyid=4465 Third Party Advisory
http://secunia.com/advisories/29763 Third Party Advisory
http://secunia.com/advisories/29865 Third Party Advisory
http://secunia.com/advisories/30404 Third Party Advisory
http://secunia.com/advisories/30430 Third Party Advisory
http://secunia.com/advisories/30507 Third Party Advisory
http://www.iss.net/threats/289.html Broken Link
http://www.kb.cert.org/vuls/id/159523 Third Party Advisory
http://www.kb.cert.org/vuls/id/395473 Third Party Advisory
http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit Third Party Advisory
http://www.osvdb.org/44282 Broken Link
http://www.securityfocus.com/bid/28695 Third Party Advisory
http://www.securityfocus.com/bid/29386 Third Party Advisory
http://www.securitytracker.com/id?1019811 Third Party Advisory
http://www.securitytracker.com/id?1020114 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-100A.html Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-149A.html Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-150A.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/1662/references Third Party Advisory
http://www.vupen.com/english/advisories/2008/1697 Third Party Advisory
http://www.vupen.com/english/advisories/2008/1724/references Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-08-032 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/37277 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10379 Signature
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Adobe
Search vendor "Adobe"
Flash Player
Search vendor "Adobe" for product "Flash Player"
>= 8.0 <= 8.0.39.0
Search vendor "Adobe" for product "Flash Player" and version " >= 8.0 <= 8.0.39.0"
-
Affected
Adobe
Search vendor "Adobe"
Flash Player
Search vendor "Adobe" for product "Flash Player"
>= 9.0 <= 9.0.115.0
Search vendor "Adobe" for product "Flash Player" and version " >= 9.0 <= 9.0.115.0"
-
Affected