Login
Newsletter
Werbung

Sicherheit: Cross-Site Scripting in flash-player
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in flash-player
ID: TLSA-2006-46
Distribution: TurboLinux
Plattformen: Turbolinux FUJI
Datum: Do, 28. Dezember 2006, 03:50
Referenzen: Keine Angabe
Applikationen: Flash Plugin for Browsers

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

--------------------------------------------------------------------------
Turbolinux Security Advisory TLSA-2006-46
http://www.turbolinux.co.jp/security/
security-team@turbolinux.co.jp
--------------------------------------------------------------------------

Original released date: 27 Dec 2006
Last revised: 27 Dec 2006

Package: flash-player

Summary: CRLF injection vulnerability

More information:
Macromedia Flash Player for firefox and Mozilla compatible.

The flash-player allows remote attackers to modify HTTP headers of client
requests and conduct HTTP Request Splitting attacks via CRLF sequences.

Impact:
These vulnerabilities would allow remote attackers to modify
HTTP headers of client requests and conduct HTTP Request Splitting attacks.


Affected Products:
- Turbolinux FUJI


<Turbolinux FUJI>

Source Packages
Size: MD5

flash-player-7.0.69.0-1.src.rpm
997699 339bb634fa19a7198d1ca4302e28ad9a

Binary Packages
Size: MD5

flash-player-7.0.69.0-1.i586.rpm
1021707 2812dfc5e8106515e329fd4cec0af5e8


Adobe Systems
[APSB06-18]
http://www.adobe.com/support/security/bulletins/apsb06-18.html

--------------------------------------------------------------------------
Revision History
27 Dec 2006 Initial release
--------------------------------------------------------------------------

Copyright(C) 2006 Turbolinux, Inc. All rights reserved.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD4DBQFFkhedK0LzjOqIJMwRAotTAJY7Xh6chra+NIxtJfjQwNWmAsTRAJ0UWUlf
xMBkOgLd+PodqqjuE1AJ0Q==
=qsao
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung