Check Point Reference: | CPAI-2013-1673 |
Date Published: | 18 Apr 2013 |
Severity: | Critical |
Last Updated: | Wednesday 08 January, 2025 |
Source: | CVE-2013-2555 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Adobe Flash Player 11.6.602.180 and earlier versions for Windows and Macintosh Adobe Flash Player 11.2.202.275 and earlier versions for Linux Adobe Flash Player 11.1.115.48 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.44 and earlier versions for Android 3.x and 2.x Adobe AIR 3.6.0.6090 and earlier versions for Windows, Macintosh and Android Adobe AIR 3.6.0.6090 SDK & Compiler and earlier versions |
Vulnerability Description | A code execution vulnerability has been reported in the Adobe Flash Player. The vulnerability is due to insufficient sanitization by the Adobe Flash Player when reading data from a RTMP multimedia stream. A remote attacker may exploit this issue by sending a specially crafted RTMP packet to the vulnerable server. Successful exploitation of this vulnerability may allow the attacker to execute arbitrary code on the target system. |
This protection will detect and block attempts to transfer malformed RTMP packets sent to the vulnerable client.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Adobe Products Violation
Attack Information: Adobe Flash Player RTMP Code Execution (APSB13-11)