“We re-released MS06-069 to add XP SP3 as an affected version”, revealed Tami Gallupe, MSRC Release Manager. However, this time around, the Redmond company is not at fault. The label of Microsoft Security Bulletin MS06-069 reveals that this issue was patched as far back as 2006, on November 14 in fact. A couple of years ago Microsoft served a security update for vulnerabilities in Flash Player from Adobe that could allow an attacker to perform remote code execution on an operating system affected by the vulnerability, in the eventuality of a successful exploit.
The list of impacted platforms contains not only XP SP2 and SP3 but also Windows Vista (but not Vista SP1). "Vulnerable versions of Macromedia Flash Player from Adobe are redistributed with Microsoft Windows XP Service Pack 2, Microsoft Windows XP Service Pack 3, and Microsoft Windows XP Professional x64 Edition", Microsoft informed after it has updated the security bulletin.
Because the security vulnerability patched by MS06-069 targets a flaw in third party software, the Redmond company has not included the item among the updates in XP SP3 RTM. In this context, end users who perform clean installs of XP SP3 via slipstream integrated versions of the service pack are at risk from exploits unless they apply the patch that is already available. There are not changes in the binaries of the update for XP SP2 in comparison to those for XP SP3.
“Several remote code execution vulnerabilities exist in Macromedia Flash Player from Adobe because of the way that it handles Flash Animation (SWF) files. An attacker could exploit these vulnerabilities by constructing a specially crafted Flash Animation (SWF) file that could potentially allow remote code execution if a user visited a Web site containing the specially crafted SWF file. The specially crafted SWF file could also be sent as an e-mail attachment. A user would only be at risk if opening this e-mail attachment. An attacker who successfully exploited these vulnerabilities could take complete control of an affected system”, reads the description of the vulnerability as provided by Microsoft.