5
CVSSv2

CVE-2007-5275

Published: 08/10/2007 Updated: 29/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The Adobe Macromedia Flash 9 plug-in allows remote malicious users to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.

Vulnerable Product Search on Vulmon Subscribe to Product

adobe shockwave player 9

Vendor Advisories

Debian Bug report logs - #449110 CVE-2007-5275: possible vulnerability Package: flashplugin-nonfree; Maintainer for flashplugin-nonfree is Bart Martens <bartm@debianorg>; Source for flashplugin-nonfree is src:flashplugin-nonfree (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: S ...
Debian Bug report logs - #459071 CVE-2007-6637: Multiple cross-site scripting (XSS) vulnerabilities Package: flashplugin-nonfree; Maintainer for flashplugin-nonfree is Bart Martens <bartm@debianorg>; Source for flashplugin-nonfree is src:flashplugin-nonfree (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeri ...

References

CWE-20http://crypto.stanford.edu/dns/dns-rebinding.pdfhttp://www.adobe.com/support/security/bulletins/apsb07-20.htmlhttp://www.redhat.com/support/errata/RHSA-2007-1126.htmlhttp://www.us-cert.gov/cas/techalerts/TA07-355A.htmlhttp://www.securityfocus.com/bid/26930http://securitytracker.com/id?1019116http://secunia.com/advisories/28157http://secunia.com/advisories/28161http://www.gentoo.org/security/en/glsa/glsa-200801-07.xmlhttp://secunia.com/advisories/28570http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.htmlhttp://secunia.com/advisories/28213http://www.adobe.com/support/security/bulletins/apsb08-11.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0221.htmlhttp://www.us-cert.gov/cas/techalerts/TA08-100A.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.htmlhttp://secunia.com/advisories/29763http://www.gentoo.org/security/en/glsa/glsa-200804-21.xmlhttp://secunia.com/advisories/29865http://lists.apple.com/archives/security-announce/2008//May/msg00001.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1http://www.us-cert.gov/cas/techalerts/TA08-150A.htmlhttp://secunia.com/advisories/30430http://secunia.com/advisories/30507http://www.vupen.com/english/advisories/2008/1697http://www.vupen.com/english/advisories/2007/4258http://www.vupen.com/english/advisories/2008/1724/referenceshttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250https://nvd.nist.govhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449110