First published: Mon Nov 21 2011(Updated: )
A security flaw was found in the way Shockwave Flash plug-in of the gnash, a GNU flash movie player, performed management of HTTP cookies (they were stored under /tmp directory with world-readable permissions). A local attacker could use this flaw to obtain sensitive information. References: [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Gnash | <=0.8.9 | |
GNU Gnash | =0.8.5 | |
GNU Gnash | =0.8.7 | |
GNU Gnash | =0.8.8 | |
GNU Gnash | =0.8.9-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4328 has been assigned a moderate severity level due to the risk of sensitive information disclosure.
To fix CVE-2011-4328, it is recommended to upgrade the GNU Gnash player to version 0.8.9 or later.
CVE-2011-4328 can be exploited by local attackers to access sensitive information through improperly managed HTTP cookies.
CVE-2011-4328 affects GNU Gnash versions 0.8.5 to 0.8.9, including all versions prior to these.
There are no specific workarounds for CVE-2011-4328, the best course of action is to update to a secure version.