CVE-2007-5275

CVSS V2 Medium 5 CVSS V3 None
Description
The Adobe Macromedia Flash 9 plug-in allows remote attackers to cause a victim machine to establish TCP sessions with arbitrary hosts via a Flash (SWF) movie, related to lack of pinning of a hostname to a single IP address after receiving an allow-access-from element in a cross-domain-policy XML document, and the availability of a Flash Socket class that does not use the browser's DNS pins, aka DNS rebinding attacks, a different issue than CVE-2002-1467 and CVE-2007-4324.
Overview
  • CVE ID
  • CVE-2007-5275
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2007-10-08T23:17:00
  • Last Modified Date
  • 2017-09-29T01:29:32
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
http://crypto.stanford.edu/dns/dns-rebinding.pdf
http://www.adobe.com/support/security/bulletins/apsb07-20.html
http://www.redhat.com/support/errata/RHSA-2007-1126.html
http://www.us-cert.gov/cas/techalerts/TA07-355A.html US Government Resource
http://www.securityfocus.com/bid/26930
http://securitytracker.com/id?1019116
http://secunia.com/advisories/28157
http://secunia.com/advisories/28161
http://www.gentoo.org/security/en/glsa/glsa-200801-07.xml
http://secunia.com/advisories/28570
http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00007.html
http://secunia.com/advisories/28213
http://www.adobe.com/support/security/bulletins/apsb08-11.html
http://www.redhat.com/support/errata/RHSA-2008-0221.html
http://www.us-cert.gov/cas/techalerts/TA08-100A.html US Government Resource
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html
http://secunia.com/advisories/29763
http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml
http://secunia.com/advisories/29865
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1
http://www.us-cert.gov/cas/techalerts/TA08-150A.html US Government Resource
http://secunia.com/advisories/30430
http://secunia.com/advisories/30507
http://www.vupen.com/english/advisories/2008/1697
http://www.vupen.com/english/advisories/2007/4258
http://www.vupen.com/english/advisories/2008/1724/references
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9250
History
Created Old Value New Value Data Type Notes
2022-05-10 08:27:26 Added to TrackCVE