Heap-based buffer overflow in Shockwave Player - CVE-2010-4188
Published: February 10, 2011 / Updated: August 11, 2020
Shockwave Player
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in The dirapi.dll module in Adobe Shockwave Player before 11.5.9.620. A remote attacker can use a Director movie with an IFWV chunk with a size field of 0 to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2010-4188
Sources
- http://dvlabs.tippingpoint.com/advisory/TPTI-11-01
- http://www.adobe.com/support/security/bulletins/apsb11-01.html
- http://www.securityfocus.com/archive/1/516332/100/0/threaded
- http://www.securityfocus.com/bid/46319
- http://www.securitytracker.com/id?1025056
- http://www.vupen.com/english/advisories/2011/0335