[PCWorks] Adobe Shockwave Player Multiple Vulnerabilities

  • From: "Clint Hamilton-PCWorks Admin" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Thu, 13 May 2010 01:46:15 -0500

TITLE:
Adobe Shockwave Player Multiple Vulnerabilities

Highly critical
Impact:  System access
Where:  From remote

VERIFY ADVISORY:
http://secunia.com/advisories/38751/

DESCRIPTION:
Some vulnerabilities have been reported in Adobe Shockwave 
Player,
which can be exploited by malicious people to compromise a 
user's
system.

1) A boundary error while processing FFFFFF45h Shockwave 3D 
blocks
can be exploited to corrupt memory.

2) A signedness error in the processing of Director files can 
be
exploited to corrupt memory.

3) An array indexing error when processing Director files can 
be
exploited to corrupt memory.

4) An integer overflow error when processing Director files can 
be
exploited to corrupt memory.

5) An error when processing asset entries contained in Director 
files
can be exploited to corrupt memory.

6) A boundary error when processing embedded fonts can be 
exploited
to cause a heap-based buffer overflow via a specially crafted
Director file.

7) An error when processing Director files can be exploited to
overwrite 4 bytes of memory.

8) An error in the implementation of ordinal function 1409 in
iml32.dll can be exploited to corrupt heap memory via a 
specially
crafted Director file.

9) An error when processing a 4-byte field inside FFFFFF49h 
Shockwave
3D blocks can be exploited to corrupt heap memory.

10) An unspecified error can be exploited to corrupt memory.

11) A second unspecified error can be exploited to corrupt 
memory.

12) A third unspecified error can be exploited to corrupt 
memory.

13) A fourth unspecified error can be exploited to cause a 
buffer
overflow.

14) A fifth unspecified error can be exploited to corrupt 
memory.

15) A sixth unspecified error can be exploited to corrupt 
memory.

16) A seventh unspecified error can be exploited to corrupt 
memory.

17) An error when processing signed values encountered while 
parsing
"pami" RIFF chunks can be exploited to corrupt memory.

Successful exploitation of the vulnerabilities may allow 
execution of
arbitrary code.

The vulnerabilities are reported in versions 11.5.6.606 and 
prior on
Windows and Macintosh.

SOLUTION:
Update to version 11.5.7.609.
http://get.adobe.com/shockwave/

ORIGINAL ADVISORY:
Adobe:
http://www.adobe.com/support/security/bulletins/apsb10-12.html

Secunia Research:
http://secunia.com/secunia_research/2010-17/
http://secunia.com/secunia_research/2010-19/
http://secunia.com/secunia_research/2010-20/
http://secunia.com/secunia_research/2010-22/
http://secunia.com/secunia_research/2010-34/
http://secunia.com/secunia_research/2010-50/

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-10-087/
http://www.zerodayinitiative.com/advisories/ZDI-10-088/
http://www.zerodayinitiative.com/advisories/ZDI-10-089/

iDefense:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=869

Code Audit Labs:
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0137.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0138.html
http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html

Zero Science Lab:
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php

Core Security Technologies:
http://www.coresecurity.com/content/adobe-director-invalid-read

=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.
-zxdjhu-

Other related posts: