Check Point Advisories

Macromedia Flash Media Server Malformed Data Denial of Service (CVE-2005-4216)

Check Point Reference: CPAI-2012-1344
Date Published: 1 Jan 2013
Severity: High
Last Updated: Friday 29 March, 2024
Source: CVE-2005-4216
Protection Provided by:

Security Gateway
R75

Who is Vulnerable? Adobe Systems Macromedia Flash Media Server 1.5
Adobe Systems Macromedia Flash Media Server 2.0
Vulnerability Description There exists a denial of service vulnerability in Macromedia Flash Media Server.
Vulnerability DetailsThe vulnerability exists due to an error in the way that the affected server handles malformed data. An attacker can exploit the vulnerability by sending a crafted message to the server, causing its termination thereby creating a denial of service condition.Upon receiving the malicious request, the Flash Media Administration Server process will terminate. The service will not resume until it is restarted manually. Until such time as the service is restarted, the administration functionality of the affected server will be unavailable, all other services provided by the Flash Media Server will be unaffected.

Protection Overview

IPS will detect and block crafted requests sent to the server.

In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.

Security Gateway R75 / R71 / R70

  1. In the IPS tab, click Protections and find the Macromedia Flash Media Server Malformed Data Denial of Service protection using the Search tool and Edit the protection's settings.
  2. Install policy on all modules.

SmartView Tracker will log the following entries:
Attack Name: Adobe Products Violation
Attack Information: Macromedia Flash Media Server Malformed Data Denial of Service

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK