drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in flash-player
Name: |
Cross-Site Scripting in flash-player |
|
ID: |
TLSA-2006-46 |
|
Distribution: |
TurboLinux |
|
Plattformen: |
Turbolinux FUJI |
|
Datum: |
Do, 28. Dezember 2006, 03:50 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
Flash Plugin for Browsers |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
-------------------------------------------------------------------------- Turbolinux Security Advisory TLSA-2006-46 http://www.turbolinux.co.jp/security/ security-team@turbolinux.co.jp --------------------------------------------------------------------------
Original released date: 27 Dec 2006 Last revised: 27 Dec 2006
Package: flash-player
Summary: CRLF injection vulnerability
More information: Macromedia Flash Player for firefox and Mozilla compatible.
The flash-player allows remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks via CRLF sequences.
Impact: These vulnerabilities would allow remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks.
Affected Products: - Turbolinux FUJI
<Turbolinux FUJI>
Source Packages Size: MD5
flash-player-7.0.69.0-1.src.rpm 997699 339bb634fa19a7198d1ca4302e28ad9a
Binary Packages Size: MD5
flash-player-7.0.69.0-1.i586.rpm 1021707 2812dfc5e8106515e329fd4cec0af5e8
Adobe Systems [APSB06-18] http://www.adobe.com/support/security/bulletins/apsb06-18.html
-------------------------------------------------------------------------- Revision History 27 Dec 2006 Initial release --------------------------------------------------------------------------
Copyright(C) 2006 Turbolinux, Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux)
iD4DBQFFkhedK0LzjOqIJMwRAotTAJY7Xh6chra+NIxtJfjQwNWmAsTRAJ0UWUlf xMBkOgLd+PodqqjuE1AJ0Q== =qsao -----END PGP SIGNATURE-----
|
|
|
|