Computer Security
[EN] securityvulns.ru no-pyccku


gnash multiple security vulnerabilities
Published:26.03.2012
Source:
SecurityVulns ID:12292
Type:client
Threat Level:
5/10
Description:Ingerer overflow on SWF parsing, unsafe cookie handling, symbolic links vulnerability.
Affected:GNU : gnash 0.8
CVE:CVE-2012-1175 (Integer overflow in the GnashImage::size method in libbase/GnashImage.h in GNU Gnash 0.8.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SWF file, which triggers a heap-based buffer overflow.)
 CVE-2011-4328 (plugin/npapi/plugin.cpp in Gnash before 0.8.10 uses weak permissions (word readable) for cookie files with predictable names in /tmp, which allows local users to obtain sensitive information.)
 CVE-2010-4337 (The configure script in gnash 0.8.8 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/gnash-configure-errors.$$, (2) /tmp/gnash-configure-warnings.$$, or (3) /tmp/gnash-configure-recommended.$$ files.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 2435-1] gnash security update (26.03.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod