First published: Mon Nov 21 2011(Updated: )
A security flaw was found in the way Shockwave Flash plug-in of the gnash, a GNU flash movie player, performed management of HTTP cookies (they were stored under /tmp directory with world-readable permissions). A local attacker could use this flaw to obtain sensitive information. References: [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Gnash |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-755518 is considered high due to the potential for local attackers to access sensitive information.
To fix REDHAT-BUG-755518, update your GNU Gnash to the latest version that addresses the vulnerability.
REDHAT-BUG-755518 affects any system using the GNU Gnash Flash movie player with the vulnerable cookie management configuration.
Yes, REDHAT-BUG-755518 can lead to data breaches by allowing local attackers to read sensitive HTTP cookies.
A potential workaround for REDHAT-BUG-755518 is to restrict access to the /tmp directory or to avoid using the vulnerable Gnash plug-in.