CERT-In Advisory
CIAD-2010-0062
Multiple Vulnerabilities in Adobe Shockwave Player
Original Issue Date: September 09, 2010
Severity Rating: High
Systems Affected
- Adobe Shockwave Player 11.5.7.609 and earlier versions for Windows and Macintosh
Overview
Multiple vulnerabilities have been reported in Adobe Shockwave Player, which could allow a remote attacker to execute an arbitrary code or cause denial of service condition.
Description
Multiple memory corruption vulnerabilities have been reported in Adobe Shockwave Player due to various Integer and Heap-based buffer overflow errors when processing ".dir" files in the IML32.dll module , the tSAC RIFF chunk in the DIRAPI, the rcsL RIFF chunk in the DIRAPIX module, when handling the chunk size following the fourCC value in Ordinal1111 (IML32X module), 0xFFFFFF45 records of 3D objects, the PAMI RIFF chunk, the rcsL RIFF chunk, the tSAC RIFF chunk, 0xFFFFFFF8 records, when processing the CSWV RIFF chunk, tSAC RIFF chunk within the DIRAPIX.dll module, the TextXtra.x32 module, ".dir" files in the DIRAPI.dll module.
A remote attacker could exploit these vulnerabilities via a specially crafted Shockwave file to trigger heap-based buffer overflow , integer overflow and memory corruption errors. Successful exploitation of these vulnerabilities could allow a remote attacker to execute an arbitrary code or cause Denial of Service (DoS) condition.
Solution
Update to Adobe Shockwave Player 11.5.8.612.
http://get.adobe.com/shockwave/
Vendor Information
Adobe
http://www.adobe.com/support/security/bulletins/apsb10-20.html
References
Adobe
http://www.adobe.com/support/security/bulletins/apsb10-20.html
ZDI
http://www.zerodayinitiative.com/advisories/ZDI-10-160/
http://www.zerodayinitiative.com/advisories/ZDI-10-161/
http://www.zerodayinitiative.com/advisories/ZDI-10-162/
http://www.zerodayinitiative.com/advisories/ZDI-10-163/
http://www.zerodayinitiative.com/advisories/ZDI-10-164/
Secunia
http://secunia.com/advisories/41065
SecurityTracker
http://securitytracker.com/alerts/2010/Aug/1024361.html
VUPEN
http://www.vupen.com/english/advisories/2010/2176
NEOHAPSIS
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0282.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0283.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0284.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0285.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0286.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0287.html
CVE Name
CVE-2010-2863
CVE-2010-2864
CVE-2010-2865
CVE-2010-2866
CVE-2010-2867
CVE-2010-2868
CVE-2010-2869
CVE-2010-2870
CVE-2010-2871
CVE-2010-2872
CVE-2010-2873
CVE-2010-2874
CVE-2010-2875
CVE-2010-2876
CVE-2010-2877
CVE-2010-2878
CVE-2010-2879
CVE-2010-2880
CVE-2010-2881
CVE-2010-2882
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|