Security Advisory
  • Adobe Shockwave Player Multiple Vulnerabilities Reported Date: 27-08-10
Rated Level: Critical
Impact: System Access,Remotely Exploitable
Affected Software: Adobe Shockwave Player 11.x
Description: Multiple vulnerabilities have been reported in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system.

1) An unspecified error can be exploited to corrupt memory.

2) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory.

3) A third unspecified error can be exploited to corrupt memory.

4) A signedness error when processing the tSAC RIFF chunk in the DIRAPI module can be exploited to corrupt memory.

5) An array indexing error when processing the rcsL RIFF chunk in the DIRAPIX module can be exploited to corrupt memory.

6) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory.

7) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory.

8) A boundary error when handling the chunk size following the fourCC value in Ordinal1111 (IML32X module) can be exploited to cause a heap-based buffer overflow via a specially crafted RIFF file.

9) An integer overflow error when processing 0xFFFFFF45 records of 3D objects can be exploited to cause a heap-based buffer overflow.

10) A signedness error when processing the PAMI RIFF chunk can be exploited to corrupt memory.

11) An indexing error when processing the rcsL RIFF chunk can be exploited to corrupt heap-based memory and overwrite a function pointer via a specially crafted Director file with ".dir" or ".dcr" extensions.

12) An uninitialized pointer error when processing the tSAC RIFF chunk can be exploited to transfer the program flow into a random heap-based memory location.

13) A signedness error when processing the tSAC RIFF chunk can be exploited to corrupt heap-based memory.

14) A singedness error when processing the tSAC RIFF chunk can be exploited to write a NULL byte to a certain memory location.

15) An integer overflow error when processing 0xFFFFFFF8 records can be exploited to cause a heap-based buffer overflow via specially a crafted Director file with ".dir" or ".dcr" extensions.

16) An indexing error when processing the CSWV RIFF chunk within the IML32X.dll and DIRAPIX.dll modules can be exploited to corrupt heap-based memory.

17) An indexing error when processing the tSAC RIFF chunk within the DIRAPIX.dll module can be exploited to write a NULL byte to a heap-based memory location.

18) An integer overflow error in the TextXtra.x32 module can be exploited to cause a heap-based buffer overflow.

19) An unspecified error when processing ".dir" files in the DIRAPI.dll module can be exploited to corrupt memory.

20) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory.

21) An unspecified error when processing ".dir" files in the DIRAPI.dll module can be exploited to corrupt memory.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in versions prior to 11.5.8.612 running on Windows and Macintosh.


Solution: Update to version 11.5.8.612 or later.
Feedback: If you have additional information or corrections for this security advisory please contact us at advisory(at)triviasecurity.org
Security Advisories by Month (2014)
TS Promotion