{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2007-0071", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Integer overflow in Adobe Flash Player 9.0.115.0 and earlier, and 8.0.39.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file with a negative Scene Count value, which passes a signed comparison, is used as an offset of a NULL pointer, and triggers a buffer overflow." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20080408 Adobe Flash Player Invalid Pointer Vulnerability", "refsource" : "ISS", "url" : "http://www.iss.net/threats/289.html" }, { "name" : "http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf", "refsource" : "MISC", "url" : "http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf" }, { "name" : "http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/", "refsource" : "MISC", "url" : "http://www.matasano.com/log/1032/this-new-vulnerability-dowds-inhuman-flash-exploit/" }, { "name" : "http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue.html", "refsource" : "MISC", "url" : "http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue.html" }, { "name" : "http://isc.sans.org/diary.html?storyid=4465", "refsource" : "MISC", "url" : "http://isc.sans.org/diary.html?storyid=4465" }, { "name" : "http://www.zerodayinitiative.com/advisories/ZDI-08-032/", "refsource" : "MISC", "url" : "http://www.zerodayinitiative.com/advisories/ZDI-08-032/" }, { "name" : "http://www.adobe.com/support/security/bulletins/apsb08-11.html", "refsource" : "CONFIRM", "url" : "http://www.adobe.com/support/security/bulletins/apsb08-11.html" }, { "name" : "APPLE-SA-2008-05-28", "refsource" : "APPLE", "url" : "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "name" : "GLSA-200804-21", "refsource" : "GENTOO", "url" : "http://www.gentoo.org/security/en/glsa/glsa-200804-21.xml" }, { "name" : "RHSA-2008:0221", "refsource" : "REDHAT", "url" : "http://www.redhat.com/support/errata/RHSA-2008-0221.html" }, { "name" : "238305", "refsource" : "SUNALERT", "url" : "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238305-1" }, { "name" : "SUSE-SA:2008:022", "refsource" : "SUSE", "url" : "http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00006.html" }, { "name" : "TA08-100A", "refsource" : "CERT", "url" : "http://www.us-cert.gov/cas/techalerts/TA08-100A.html" }, { "name" : "TA08-150A", "refsource" : "CERT", "url" : "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "name" : "TA08-149A", "refsource" : "CERT", "url" : "http://www.us-cert.gov/cas/techalerts/TA08-149A.html" }, { "name" : "VU#159523", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/159523" }, { "name" : "VU#395473", "refsource" : "CERT-VN", "url" : "http://www.kb.cert.org/vuls/id/395473" }, { "name" : "28695", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/28695" }, { "name" : "29386", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/29386" }, { "name" : "oval:org.mitre.oval:def:10379", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10379" }, { "name" : "ADV-2008-1662", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2008/1662/references" }, { "name" : "ADV-2008-1697", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2008/1697" }, { "name" : "ADV-2008-1724", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2008/1724/references" }, { "name" : "44282", "refsource" : "OSVDB", "url" : "http://www.osvdb.org/44282" }, { "name" : "1019811", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id?1019811" }, { "name" : "1020114", "refsource" : "SECTRACK", "url" : "http://www.securitytracker.com/id?1020114" }, { "name" : "29763", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/29763" }, { "name" : "29865", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/29865" }, { "name" : "30404", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/30404" }, { "name" : "30430", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/30430" }, { "name" : "30507", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/30507" }, { "name" : "multimedia-file-integer-overflow(37277)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/37277" } ] } }