First published: Tue Jul 10 2007(Updated: )
Adobe Integrated Runtime (AIR, aka Apollo) allows context-dependent attackers to modify arbitrary files within an executing .air file (compiled AIR application) and perform cross-site scripting (XSS) attacks, as demonstrated by an application that modifies an HTML file inside itself via JavaScript that uses an APPEND open operation and the writeUTFBytes function. NOTE: this may be an intended consequence of the AIR permission model; if so, then perhaps this issue should not be included in CVE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3640 has a moderate severity level due to its potential for file modification and XSS attacks.
To fix CVE-2007-3640, update Adobe AIR to the latest version that addresses this vulnerability.
Users of Adobe Integrated Runtime (AIR) applications that utilize the affected software are at risk from CVE-2007-3640.
CVE-2007-3640 can lead to arbitrary file modification and cross-site scripting (XSS) attacks.
CVE-2007-3640 impacts various versions of Adobe AIR SDK, with no specific versions being excluded.