First published: Tue Oct 17 2006(Updated: )
CRLF injection vulnerability in Adobe Flash Player plugin 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, 7.x before 7.0 r67 for Solaris, and before 9.0.28.0 for Mac OS X, allows remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks via CRLF sequences in arguments to the ActionScript functions (1) XML.addRequestHeader and (2) XML.contentType. NOTE: the flexibility of the attack varies depending on the type of web browser being used.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Flash Player for Internet Explorer 11 | <=7.0.63 | |
Adobe Flash Player for Internet Explorer 11 | <=7.0_r67 | |
Adobe Flash Player for Internet Explorer 11 | <=9.0.16 | |
Adobe Flash Player for Internet Explorer 11 | <=9.0.28.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5330 is considered a critical vulnerability due to its potential for HTTP Request Splitting attacks.
To fix CVE-2006-5330, upgrade to Adobe Flash Player version 9.0.28.0 or later for Mac OS X, and version 9.0.16 for Windows.
CVE-2006-5330 affects Adobe Flash Player versions 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, 7.x before 7.0 r67 for Solaris, and prior to 9.0.28.0 for Mac OS X.
CVE-2006-5330 allows attackers to modify HTTP headers leading to HTTP Request Splitting attacks.
While CVE-2006-5330 primarily impacts outdated software, any remaining instances of the affected versions represent a significant security risk.