[NT] Adobe Flash Media Server 2 Multiple Integer Overflow Vulnerabilities
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 13 Feb 2008 09:42:37 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Adobe Flash Media Server 2 Multiple Integer Overflow Vulnerabilities
<http://www.adobe.com/products/flashmediaserver/> Adobe Flash Media
Server is "an application server for Flash based applications. It provides
an environment to run interactive media applications, as well as audio and
video streaming functionality". Remote exploitation of multiple integer
overflow vulnerabilities in Adobe Systems Inc.'s Flash Media Server 2
could allow an unauthenticated attacker to execute arbitrary code with
* Flash Media Server 2 version 2.0.4
* Flash Media Server 2 version 2.0.5
The Flash Media Server contains a component called the Edge server, which
listens on TCP ports 1935 and 19350 for incoming connections. This port is
the primary port used for client/server communication. The Edge server
speaks the Real Time Message Protocol, or RTMP, a proprietary binary
protocol developed by Adobe.
These vulnerabilities exist within the code responsible for parsing RTMP
messages. In each case, a 32-bit value taken directly from the packet is
used in an arithmetic operation to calculate the number of bytes to
allocate for a dynamic buffer. This operation can overflow, which later
leads to a heap overflow.
Exploitation of these vulnerabilities results in the execution of
arbitrary code with SYSTEM level privileges. In order to exploit these
vulnerabilities, an attacker only needs the ability to connect to the
target server on TCP port 1935 or 19350.
Unsuccessful attempts at exploitation will likely result in the Edge
server crashing. After crashing, the Edge server will be restarted
automatically. This gives an attacker an unlimited number of attempts at
Adobe has addressed these vulnerabilities by releasing version 2.0.5 of
Flash Media Server. For more information, consult their bulletin at the
11/27/2007 - Initial vendor notification
11/27/2007 - Initial vendor response
02/12/2008 - Coordinated public disclosure
The information has been provided by iDefense Labs.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NEWS] ClamAV libclamav PE File Integer Overflow Vulnerability
- Next by Date: [NT] Microsoft Internet Explorer SVG animateMotion.by Code Execution Vulnerability
- Previous by thread: [NEWS] ClamAV libclamav PE File Integer Overflow Vulnerability
- Next by thread: [NT] Microsoft Internet Explorer SVG animateMotion.by Code Execution Vulnerability