CVE-2006-5330

CRLF injection vulnerability in Adobe Flash Player plugin 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, 7.x before 7.0 r67 for Solaris, and before 9.0.28.0 for Mac OS X, allows remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks via CRLF sequences in arguments to the ActionScript functions (1) XML.addRequestHeader and (2) XML.contentType. NOTE: the flexibility of the attack varies depending on the type of web browser being used.
References
Link Resource
http://docs.info.apple.com/article.html?artnum=305214
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0006.html
http://secunia.com/advisories/22467 Vendor Advisory
http://secunia.com/advisories/23324 Vendor Advisory
http://secunia.com/advisories/23581 Vendor Advisory
http://secunia.com/advisories/24479 Vendor Advisory
http://secunia.com/advisories/25467 Vendor Advisory
http://securityreason.com/securityalert/1737
http://securitytracker.com/id?1017078
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102932-1
http://www.adobe.com/support/security/advisories/apsa06-01.html
http://www.adobe.com/support/security/bulletins/apsb06-18.html
http://www.osvdb.org/29863
http://www.rapid7.com/advisories/R7-0026.jsp
http://www.redhat.com/support/errata/RHSA-2007-0009.html
http://www.securityfocus.com/archive/1/448997/100/0/threaded
http://www.securityfocus.com/bid/20592
http://www.us-cert.gov/cas/techalerts/TA07-072A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4094
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2007/1999
https://exchange.xforce.ibmcloud.com/vulnerabilities/29634
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11405
http://docs.info.apple.com/article.html?artnum=305214
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0006.html
http://secunia.com/advisories/22467 Vendor Advisory
http://secunia.com/advisories/23324 Vendor Advisory
http://secunia.com/advisories/23581 Vendor Advisory
http://secunia.com/advisories/24479 Vendor Advisory
http://secunia.com/advisories/25467 Vendor Advisory
http://securityreason.com/securityalert/1737
http://securitytracker.com/id?1017078
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102932-1
http://www.adobe.com/support/security/advisories/apsa06-01.html
http://www.adobe.com/support/security/bulletins/apsb06-18.html
http://www.osvdb.org/29863
http://www.rapid7.com/advisories/R7-0026.jsp
http://www.redhat.com/support/errata/RHSA-2007-0009.html
http://www.securityfocus.com/archive/1/448997/100/0/threaded
http://www.securityfocus.com/bid/20592
http://www.us-cert.gov/cas/techalerts/TA07-072A.html US Government Resource
http://www.vupen.com/english/advisories/2006/4094
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2007/1999
https://exchange.xforce.ibmcloud.com/vulnerabilities/29634
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11405
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:flash_player:*:*:linux:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:solaris:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:windows:*:*:*:*:*
cpe:2.3:a:adobe:flash_player:*:*:mac_os_x:*:*:*:*:*

History

21 Nov 2024, 00:18

Type Values Removed Values Added
References () http://docs.info.apple.com/article.html?artnum=305214 - () http://docs.info.apple.com/article.html?artnum=305214 -
References () http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html - () http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html -
References () http://lists.suse.com/archive/suse-security-announce/2006-Dec/0006.html - () http://lists.suse.com/archive/suse-security-announce/2006-Dec/0006.html -
References () http://secunia.com/advisories/22467 - Vendor Advisory () http://secunia.com/advisories/22467 - Vendor Advisory
References () http://secunia.com/advisories/23324 - Vendor Advisory () http://secunia.com/advisories/23324 - Vendor Advisory
References () http://secunia.com/advisories/23581 - Vendor Advisory () http://secunia.com/advisories/23581 - Vendor Advisory
References () http://secunia.com/advisories/24479 - Vendor Advisory () http://secunia.com/advisories/24479 - Vendor Advisory
References () http://secunia.com/advisories/25467 - Vendor Advisory () http://secunia.com/advisories/25467 - Vendor Advisory
References () http://securityreason.com/securityalert/1737 - () http://securityreason.com/securityalert/1737 -
References () http://securitytracker.com/id?1017078 - () http://securitytracker.com/id?1017078 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102932-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102932-1 -
References () http://www.adobe.com/support/security/advisories/apsa06-01.html - () http://www.adobe.com/support/security/advisories/apsa06-01.html -
References () http://www.adobe.com/support/security/bulletins/apsb06-18.html - () http://www.adobe.com/support/security/bulletins/apsb06-18.html -
References () http://www.osvdb.org/29863 - () http://www.osvdb.org/29863 -
References () http://www.rapid7.com/advisories/R7-0026.jsp - () http://www.rapid7.com/advisories/R7-0026.jsp -
References () http://www.redhat.com/support/errata/RHSA-2007-0009.html - () http://www.redhat.com/support/errata/RHSA-2007-0009.html -
References () http://www.securityfocus.com/archive/1/448997/100/0/threaded - () http://www.securityfocus.com/archive/1/448997/100/0/threaded -
References () http://www.securityfocus.com/bid/20592 - () http://www.securityfocus.com/bid/20592 -
References () http://www.us-cert.gov/cas/techalerts/TA07-072A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA07-072A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/4094 - () http://www.vupen.com/english/advisories/2006/4094 -
References () http://www.vupen.com/english/advisories/2007/0930 - () http://www.vupen.com/english/advisories/2007/0930 -
References () http://www.vupen.com/english/advisories/2007/1999 - () http://www.vupen.com/english/advisories/2007/1999 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29634 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29634 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11405 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11405 -

Information

Published : 2006-10-17 21:07

Updated : 2024-11-21 00:18


NVD link : CVE-2006-5330

Mitre link : CVE-2006-5330

CVE.ORG link : CVE-2006-5330


JSON object : View

Products Affected

adobe

  • flash_player
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')