Home ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) Programs ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) Emergency management ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) Response ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) CCIRC ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) Analytical releases2 ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/spacer.gif) ![](/web/20061025232914im_/http://psepc.gc.ca/world/site/images/breadcrumb_arrow.gif) AV06-031: Adobe Macromedia Flash Player multiple remote code execution vulnerabilities
Number: AV06-031 Date: 13 September 2006 PurposeThe purpose of this advisory is to bring attention to multiple vulnerabilities that have been identified in Adobe Macromedia Flash Player. AssessmentCritical vulnerabilities have been identified in Flash Player 8.0.24.0 and earlier versions that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system. A malicious SWF file must be loaded in Flash Player by the end user for an attacker to exploit these vulnerabilities. The first flaw is due to input validation errors when handling overly long dynamically generated strings, which could be exploited by remote attackers to execute arbitrary commands via a malcious web page. The second issue is due to an error within the "allowScriptAccess" option, which could be exploited by malicious web sites to bypass security restrictions and conduct cross domain scripting attacks. The third vulnerability is due to an error in the way the ActiveX control is invoked by Office products, which could be exploited by attackers to execute arbitrary Flash code without user interaction when a malicious office document is opened.
Suggested actionDPS recommends that administrators test and upgrade to the newest version 9.0.16.0 at: http://www.adobe.com/go/getflashplayer/ For more information, please refer to: http://www.frsirt.com/english/advisories/2006/3573 http://www.adobe.com/support/security/bulletins/apsb06-11.html Note to readersCanadian Cyber Incident Response Centre (CCIRC) collects information related to cyber threats to, and incidents involving, Canadian critical infrastructure. This allows us to monitor and analyze threats and to issue alerts, advisories and other information products. To report threats or incidents, please contact the Government Operations Centre (GOC) at (613) 991-7000 or goc-cog@psepc.gc.ca by e-mail. Unauthorized use of computer systems and mischief in relation to data are serious Criminal Code offences in Canada. Any suspected criminal activity should be reported to local law enforcement organizations. The Royal Canadian Mounted Police (RCMP) National Operations Centre (N.O.C.) provides a 24/7 service to receive such reports or to redirect callers to local law enforcement organizations. The N.O.C. can be reached at (613) 993-4460. National security concerns should be reported to the Canadian Security Intelligence Service (CSIS) at (613) 993-9620. For urgent matters or to report any incidents, please contact the Government Operations Centre at: Phone: (613) 991-7000 Fax: (613) 996-0995 Secure Fax: (613) 991-7094 Email: goc-cog@psepc.gc.ca For general information on critical infrastructure protection and emergency preparedness, please contact PSEPC's Public Affairs division at: Telephone: (613) 944-4875 or 1-800-830-3118 Fax: (613) 998-9589 E-mail: communications@psepc.gc.ca
|