Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK & Compiler before 14.0.0.178 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API, in conjunction with a manipulation involving a $ (dollar sign) or ( (open parenthesis) character. NOTE: this issue exists because of an incomplete fix for CVE-2014-4671.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Adobe_air | Adobe | * | 14.0.0.137 (including) |
Adobe_air | Adobe | 13.0.0.83 (including) | 13.0.0.83 (including) |
Adobe_air | Adobe | 13.0.0.111 (including) | 13.0.0.111 (including) |
Adobe_air | Adobe | 14.0.0.110 (including) | 14.0.0.110 (including) |
Adobe-flashplugin | Ubuntu | lucid | * |
Adobe-flashplugin | Ubuntu | precise | * |
Adobe-flashplugin | Ubuntu | trusty | * |
Flashplugin-nonfree | Ubuntu | devel | * |
Flashplugin-nonfree | Ubuntu | lucid | * |
Flashplugin-nonfree | Ubuntu | precise | * |
Flashplugin-nonfree | Ubuntu | trusty | * |
Supplementary for Red Hat Enterprise Linux 5 | RedHat | flash-plugin-0:11.2.202.400-1.el5 | * |
Supplementary for Red Hat Enterprise Linux 6 | RedHat | flash-plugin-0:11.2.202.400-1.el6 | * |