Bug 132527 (CVE-2005-2628) - VUL-0: CVE-2005-2628: flash-player buffer overflow
Summary: VUL-0: CVE-2005-2628: flash-player buffer overflow
Status: RESOLVED FIXED
Alias: CVE-2005-2628
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2005-2628: CVSS v2 Base Score: 5....
Keywords:
Depends on:
Blocks:
 
Reported: 2005-11-07 10:12 UTC by Ludwig Nussel
Modified: 2021-12-07 16:06 UTC (History)
2 users (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Ludwig Nussel 2005-11-07 10:12:17 UTC
We received the following report via full-disclosure.
The issue is public.

I can't find any statement that clearly says whether Linux is or is not affected by this.

   6 remote non-root user
  +1 default package
  +1 default active
  -1 user interaction
  +1 command execution

Total Score: 8 (Critical)

Date: Fri, 4 Nov 2005 17:30:15 -0800
From: Advisories@eeye.com
To: bugtraq@securityfocus.com, vulnwatch@vulnwatch.org,
	ntbugtraq@ntbugtraq.com, full-disclosure@lists.grok.org.uk
Subject: [EEYEB-20050627B] Macromedia Flash Player Improper Memory Access Vulnerability

Macromedia Flash Player Improper Memory Access Vulnerability

Release Date:
November 4, 2005

Date Reported:
June 27, 2005

Severity:
High 

Vendor:
Macromedia

Systems Affected:
Macromedia Flash 6 (on all Windows platforms) 
Macromedia Flash 7 (on all Windows platforms)

Overview:
eEye Digital Security has discovered a vulnerability in Macromedia Flash
Player versions 6 and 7 that will allow an attacker to run arbitrary
code in the context of the logged in user.  An array boundary condition
may be violated by a malicious SWF file in order to redirect execution
into attacker-supplied data.

Technical Details:
The vulnerable code exists in Flash.ocx, which embodies the code
responsible for playing back SWF files.  One function maintains a large,
256-element table of function pointers on the stack, and uses a frame
type identifier read from the SWF file as an index into the array,
without enforcing the array boundaries.  The following disassembly
depicts the affected code:

    .text:1002714F    mov     eax, [esi+0CA4h]    ; type number
    .text:10027155    mov     ecx, [esi+94h]      ; base of table
    .text:1002715B    lea     eax, [ecx+eax*8]    ; get element address
    .text:1002715E    mov     ecx, [eax]          ; 

Although the index is not validated, its value is elsewhere restricted
to be at most 0x8000, so the attacker can cause a function pointer to be
retrieved from memory up to roughly 64KB after the base of the table on
the stack.  Typically this range will include heap memory, so by
planting specific data on the heap, the attacker can very easily control
the exact value of the function pointer.  Reliable exploitation using
this technique within Internet Explorer has been demonstrated by eEye
Digital Security.

Protection:
Retina Network Security Scanner has been updated to identify this
vulnerability.
Blink - Endpoint Vulnerability Prevention - protects from this
vulnerability.

Vendor Status:
Macromedia has addressed this issue in the following security bulletin;
http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html

This vulnerability has been assigned the CVE identifier CAN-2005-2628
and OSVDB ID 18825.

Greetings:
Thanks Derek and and eEye guys help me wrote this advisory. Greeting
xfocus guys and venustech lab guys.

Credit:
Fang Xing

Copyright (c) 1998-2005 eEye Digital Security Permission is hereby
granted for the redistribution of this alert electronically. It is not
to be edited in any way without express consent of eEye. If you wish to
reprint the whole or any part of this alert in any other medium
excluding electronic medium, please email alert@eEye.com for permission.

Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There
are no warranties, implied or express, with regard to this information.
In no event shall the author be liable for any direct or indirect
damages whatsoever arising out of or in connection with the use or
spread of this information. Any use of this information is at the user's
own risk.
Comment 1 Dirk Mueller 2005-11-07 11:11:30 UTC
hmm, the security advisory says "affected are 7.0.19.0 and earlier" but we use 7.0.25.0 in all versions >= 9.1 (and NLD9)

only 9.0 has Flash Player 6, for which I can not find an update. Permission to update to do a version update to 7.0.25.0 for 9.0?

Comment 2 Andreas Jaeger 2005-11-07 15:43:30 UTC
Yes, ok.
Comment 3 Dirk Mueller 2005-11-07 17:04:09 UTC
how do we Q&A those updates ?


Comment 4 Dirk Mueller 2005-11-07 17:19:15 UTC
9.0 and 9.1 updates submitted. 

Comment 5 Dirk Mueller 2005-11-07 17:20:23 UTC
for the record: NLD9 has 7.0.25.0 but SL9.1 still has flashplayer 6.x, so I submitted an update for that as well (and comment #1 was incorrect). 

Comment 6 Ludwig Nussel 2005-11-10 10:07:30 UTC
Maintenance-Tracker-2767
Comment 7 Ludwig Nussel 2005-11-15 11:50:01 UTC
updates released
Comment 8 Thomas Biege 2009-10-13 21:46:56 UTC
CVE-2005-2628: CVSS v2 Base Score: 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)