CVE-2005-2628
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
05/11/2005
Last modified:
03/04/2025
Description
Macromedia Flash 6 and 7 (Flash.ocx) allows remote attackers to execute arbitrary code via a SWF file with a modified frame type identifier that is used as an out-of-bounds array index to a function pointer.
Impact
Base Score 2.0
5.10
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:macromedia:flash_player:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:macromedia:flash_player:6.0.29.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:macromedia:flash_player:6.0.40.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:macromedia:flash_player:6.0.47.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:macromedia:flash_player:6.0.65.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:macromedia:flash_player:6.0.79.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:macromedia:flash_player:7.0.19.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:macromedia:flash_player:7.0_r19:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
- http://secunia.com/advisories/17430
- http://secunia.com/advisories/17437/
- http://secunia.com/advisories/17481
- http://secunia.com/advisories/17626/
- http://secunia.com/advisories/17738
- http://secunia.com/advisories/20045
- http://secunia.com/advisories/20077
- http://securitytracker.com/id?1015156=
- http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml
- http://www.kb.cert.org/vuls/id/146284
- http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html
- http://www.novell.com/linux/security/advisories/2005_27_sr.html
- http://www.osvdb.org/18825
- http://www.redhat.com/support/errata/RHSA-2005-835.html
- http://www.securityfocus.com/archive/1/415789/30/0/threaded
- http://www.securityfocus.com/bid/15332
- http://www.securityfocus.com/bid/17951
- http://www.us-cert.gov/cas/techalerts/TA06-129A.html
- http://www.us-cert.gov/cas/techalerts/TA06-132A.html
- http://www.vupen.com/english/advisories/2005/2317
- http://www.vupen.com/english/advisories/2006/1744
- http://www.vupen.com/english/advisories/2006/1779
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22959
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1557
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1987
- http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
- http://secunia.com/advisories/17430
- http://secunia.com/advisories/17437/
- http://secunia.com/advisories/17481
- http://secunia.com/advisories/17626/
- http://secunia.com/advisories/17738
- http://secunia.com/advisories/20045
- http://secunia.com/advisories/20077
- http://securitytracker.com/id?1015156=
- http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml
- http://www.kb.cert.org/vuls/id/146284
- http://www.macromedia.com/devnet/security/security_zone/mpsb05-07.html
- http://www.novell.com/linux/security/advisories/2005_27_sr.html
- http://www.osvdb.org/18825
- http://www.redhat.com/support/errata/RHSA-2005-835.html
- http://www.securityfocus.com/archive/1/415789/30/0/threaded
- http://www.securityfocus.com/bid/15332
- http://www.securityfocus.com/bid/17951
- http://www.us-cert.gov/cas/techalerts/TA06-129A.html
- http://www.us-cert.gov/cas/techalerts/TA06-132A.html
- http://www.vupen.com/english/advisories/2005/2317
- http://www.vupen.com/english/advisories/2006/1744
- http://www.vupen.com/english/advisories/2006/1779
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020
- https://exchange.xforce.ibmcloud.com/vulnerabilities/22959
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1557
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1987



