Computer Security
[EN] no-pyccku

Adobe Flash Player sandbox protection bypass
updated since 10.08.2007
SecurityVulns ID:8028
Threat Level:
Description:SecurityErrorEvent can be used for client ports scanning.
Affected:ADOBE : Flash Player 9.0
CVE:CVE-2007-4324 (ActionScript 3 (AS3) in Adobe Flash Player allows remote attackers to bypass the Security Sandbox Model, obtain sensitive information, and port scan arbitrary hosts via a Flash (SWF) movie that specifies a connection to make, then uses timing discrepancies from the SecurityErrorEvent error to determine whether a port is open or not.)
Original documentdocumentSECURITEAM, [EXPL] Socket Connection Timing Can Reveal Information About Network Configuration (Exploit) (24.12.2007)
 documentfukami, Design flaw in AS3 socket handling allows port probing (10.08.2007)
Files:Flash 9 AS3 TCP-Portprober

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod