{"vuid":"VU#168372","idnumber":"168372","name":"Adobe Flash Player allowScriptAccess protection bypass vulnerability","keywords":["Adobe","Flash Player","security bypass","allowScriptAccess protection","apsb06-11","apple-2006-006","ms06-nov"],"overview":"A vulnerability in Adobe Flash Player may allow a remote attacker to bypass allowScriptAccess protection.","clean_desc":"Adobe Flash Player is a player for the Flash media format and enables frame-based animations with sound to be viewed within a web browser. According to Adobe: The AllowScriptAccess parameter of the Macromedia Flash Player controls the ability to perform outbound scripting from within a Flash SWF. A vulnerability in Adobe Flash Player may allow an attacker to circumvent the allowScriptAccess parameter. The specific cause of the underlying defect is not known.","impact":"By convincing a victim to view a HTML document (web page, HTML email) containing specially crafted Adobe Flash SWF file, an attacker could access content in a different security domain than the one containing the attacker's document.","resolution":"Upgrade Flash Player\nAdobe has addressed this issue in Adobe Flash Player 9.0.16.0. Apply updates Users who are unable to upgrade to Adobe Flash Player 9.0.16.0  should apply the appropriate player update listed in Adobe Security Bulletin APSB06-11. Users running operating systems that do not support Adobe Flash Player 8 should refer to the updates in Adobe's Flash Player TechNote. Microsoft has released an update to address this issue. See Microsoft Security Bulletin MS06-069 for more details.","workarounds":"Disable Adobe Flash Player in your web browser Until it is possible to upgrade to Adobe Flash Player 9.0.16.0 or apply the appropriate update, disabling Adobe Flash Player in the web browser will reduce the chances of exploitation.","sysaffected":"","thanks":"This issue was reported in \nAdobe Security bulletin APSB06-11","author":"This document was written by Jeff Gennari.","public":["http://secunia.com/advisories/21865/","http://www.adobe.com/cfusion/knowledgebase/index.cfm?id=tn_16494","http://www.adobe.com/devnet/security/security_zone/mpsb02-08.html","http://www.adobe.com/support/security/bulletins/apsb06-11.html","http://www.microsoft.com/technet/security/bulletin/ms06-069.mspx"],"cveids":["CVE-2006-4640"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-09-13T20:24:22Z","publicdate":"2006-09-12T00:00:00Z","datefirstpublished":"2006-09-20T11:02:32Z","dateupdated":"2006-11-14T21:30:12Z","revision":23,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"18","cam_population":"15","cam_impact":"7","cam_easeofexploitation":"11","cam_attackeraccessrequired":"20","cam_scorecurrent":"14.293125","cam_scorecurrentwidelyknown":"16.45875","cam_scorecurrentwidelyknownexploited":"25.12125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":14.293125,"vulnote":null}