[NT] Adobe Flash Media Server 2 Memory Corruption Vulnerability
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 13 Feb 2008 09:24:22 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Adobe Flash Media Server 2 Memory Corruption Vulnerability
<http://www.adobe.com/products/flashmediaserver/> Adobe Flash Media
Server is "an application server for Flash based applications. It provides
an environment to run interactive media applications, as well as audio and
video streaming functionality". Remote exploitation of a memory corruption
vulnerability in Adobe Systems Inc.'s Flash Media Server 2 could allow an
unauthenticated attacker to execute arbitrary code with SYSTEM privileges.
* Flash Media Server 2 version 2.0.4
* Flash Media Server 2 version 2.0.5
The Flash Media Server contains a component called the Edge server, which
listens on TCP ports 1935 and 19350 for incoming connections. This port is
the primary port used for client/server communication. The Edge server
speaks the Real Time Message Protocol, or RTMP, a proprietary binary
protocol developed by Adobe.
This vulnerability exists within the code responsible for parsing RTMP
messages. A certain sequence of requests can lead to an area of memory
being used after it has been released. This leads to the execution of
Exploitation of this vulnerability results in the execution of arbitrary
code with SYSTEM level privileges. In order to exploit this vulnerability,
an attacker only needs the ability to connect to the target server on TCP
port 1935 or 19350.
Unsuccessful attempts at exploitation will likely result in the Edge
server crashing. After crashing, the Edge server will be restarted
automatically. This gives an attacker an unlimited number of attempts at
iDefense is currently unaware of any workarounds for this issue.
Adobe has addressed this vulnerability by releasing version 2.0.5 of Flash
Media Server. For more information, consult their bulletin at the
11/27/2007 - Initial vendor notification
11/27/2007 - Initial vendor response
02/12/2008 - Coordinated public disclosure
The information has been provided by iDefense Labs.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NT] Ipswitch Instant Messaging Multiple Vulnerabilities
- Next by Date: [UNIX] Linux Kernel Vmsplice Unchecked User-Pointer Dereference
- Previous by thread: [NT] Ipswitch Instant Messaging Multiple Vulnerabilities
- Next by thread: [UNIX] Linux Kernel Vmsplice Unchecked User-Pointer Dereference