Multiple vulnerabilities in Adobe Shockwave Player



Published: 2011-02-10 | Updated: 2020-08-11
Risk High
Patch available NO
Number of vulnerabilities 20
CVE-ID CVE-2011-0555
CVE-2011-0556
CVE-2011-0557
CVE-2011-0569
CVE-2010-4192
CVE-2010-4193
CVE-2010-4194
CVE-2010-4195
CVE-2010-4196
CVE-2010-4306
CVE-2010-4307
CVE-2010-2588
CVE-2010-2589
CVE-2010-4093
CVE-2010-4187
CVE-2010-4188
CVE-2010-4189
CVE-2010-4190
CVE-2010-4191
CVE-2010-2587
CWE-ID CWE-119
CWE-20
CWE-122
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Shockwave Player
Client/Desktop applications / Plugins for browsers, ActiveX components

Vendor Adobe

Security Bulletin

This security bulletin contains information about 20 vulnerabilities.

1) Buffer overflow

EUVDB-ID: #VU45337

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-0555

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The TextXtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a Director file with a crafted DEMX RIFF chunk that triggers incorrect buffer allocation, a different vulnerability than CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://dvlabs.tippingpoint.com/advisory/TPTI-11-02
http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/archive/1/516333/100/0/threaded
http://www.securityfocus.com/bid/46327
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335
http://exchange.xforce.ibmcloud.com/vulnerabilities/65257


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU45338

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-0556

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PFR1 chunk that leads to an unexpected sign extension and an invalid pointer dereference, a different vulnerability than CVE-2011-0569.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://dvlabs.tippingpoint.com/advisory/TPTI-11-03
http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/archive/1/516336/100/0/threaded
http://www.securityfocus.com/bid/46328
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335
http://exchange.xforce.ibmcloud.com/vulnerabilities/65258


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

EUVDB-ID: #VU45339

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-0557

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Integer overflow in Adobe Shockwave Player before 11.5.9.620 allows remote attackers to execute arbitrary code via a Director movie with a large count value in 3D assets type 0xFFFFFF45 record, which triggers a "faulty allocation" and memory corruption.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/archive/1/516323/100/0/threaded
http://www.securityfocus.com/bid/46330
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335
http://exchange.xforce.ibmcloud.com/vulnerabilities/65259


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Buffer overflow

EUVDB-ID: #VU45340

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2011-0569

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The Font Xtra.x32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PFR1 chunk containing an invalid size value that leads to an unexpected sign extension and a buffer overflow, a different vulnerability than CVE-2011-0556.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://dvlabs.tippingpoint.com/advisory/TPTI-11-05
http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/archive/1/516335/100/0/threaded
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335
http://exchange.xforce.ibmcloud.com/vulnerabilities/65260


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Buffer overflow

EUVDB-ID: #VU45344

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4192

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted 3D Assets 0xFFFFFF88 type record that triggers an incorrect memory allocation, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4306.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/archive/1/516322/100/0/threaded
http://www.securityfocus.com/bid/46326
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335
http://www.zerodayinitiative.com/advisories/ZDI-11-078


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Input validation error

EUVDB-ID: #VU45345

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4193

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.kb.cert.org/vuls/id/189929
http://www.securityfocus.com/bid/46334
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Input validation error

EUVDB-ID: #VU45346

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4194

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.kb.cert.org/vuls/id/189929
http://www.securityfocus.com/bid/46335
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Input validation error

EUVDB-ID: #VU45347

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4195

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The TextXtra module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.kb.cert.org/vuls/id/189929
http://www.securityfocus.com/bid/46336
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Input validation error

EUVDB-ID: #VU45348

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4196

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The Shockwave 3d Asset module in Adobe Shockwave Player before 11.5.9.620 does not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.kb.cert.org/vuls/id/189929
http://www.securityfocus.com/bid/46338
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Buffer overflow

EUVDB-ID: #VU45349

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4306

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, and CVE-2010-4192.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/bid/46333
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Buffer overflow

EUVDB-ID: #VU45350

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4307

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Buffer overflow in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/bid/46339
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Buffer overflow

EUVDB-ID: #VU45351

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-2588

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2587 and CVE-2010-4188.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/bid/46318
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335
http://exchange.xforce.ibmcloud.com/vulnerabilities/65244


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Input validation error

EUVDB-ID: #VU45352

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-2589

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Integer overflow in the dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code via unspecified vectors.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/bid/46329
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335
http://exchange.xforce.ibmcloud.com/vulnerabilities/65245


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Buffer overflow

EUVDB-ID: #VU45353

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4093

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4187, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.kb.cert.org/vuls/id/189929
http://www.securityfocus.com/bid/46321
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Buffer overflow

EUVDB-ID: #VU45354

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4187

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed chunk in a Director file, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892
http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/bid/46317
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Heap-based buffer overflow

EUVDB-ID: #VU45355

Risk: High

CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2010-4188

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620. A remote attacker can use a Director movie with an IFWV chunk with a size field of 0 to trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://dvlabs.tippingpoint.com/advisory/TPTI-11-01
http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/archive/1/516332/100/0/threaded
http://www.securityfocus.com/bid/46319
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Buffer overflow

EUVDB-ID: #VU45356

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4189

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The IML32 module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie containing a GIF image with a crafted global color table size value, which causes an out-of-range pointer offset.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://dvlabs.tippingpoint.com/advisory/TPTI-11-04
http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/archive/1/516334/100/0/threaded
http://www.securityfocus.com/bid/46320
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Buffer overflow

EUVDB-ID: #VU45357

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4190

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted CSWV RIFF chunk that causes an incorrect calculation of an offset for a substructure, which causes an out-of-bounds "seek" of heap memory, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4191, CVE-2010-4192, and CVE-2010-4306.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/archive/1/516324/100/0/threaded
http://www.securityfocus.com/bid/46324
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335
http://www.zerodayinitiative.com/advisories/ZDI-11-080/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Buffer overflow

EUVDB-ID: #VU45358

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-4191

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0555, CVE-2010-4093, CVE-2010-4187, CVE-2010-4190, CVE-2010-4192, and CVE-2010-4306.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/bid/46325
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Buffer overflow

EUVDB-ID: #VU45359

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2010-2587

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2010-2588 and CVE-2010-4188.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Shockwave Player: 1.0 - 11.5.8.612

External links

http://www.adobe.com/support/security/bulletins/apsb11-01.html
http://www.securityfocus.com/bid/46316
http://www.securitytracker.com/id?1025056
http://www.vupen.com/english/advisories/2011/0335
http://exchange.xforce.ibmcloud.com/vulnerabilities/65243


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###