TITLE: Adobe Shockwave Player Multiple Vulnerabilities Criticality level: Highly critical Impact: System access Where: From remote http://secunia.com/advisories/41065/ DESCRIPTION: Multiple vulnerabilities have been reported in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system. 1) An unspecified error can be exploited to corrupt memory. 2) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory. 3) A third unspecified error can be exploited to corrupt memory. 4) A signedness error when processing the tSAC RIFF chunk in the DIRAPI module can be exploited to corrupt memory. 5) An array indexing error when processing the rcsL RIFF chunk in the DIRAPIX module can be exploited to corrupt memory. 6) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory. 7) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory. 8) A boundary error when handling the chunk size following the fourCC value in Ordinal1111 (IML32X module) can be exploited to cause a heap-based buffer overflow via a specially crafted RIFF file. 9) An integer overflow error when processing 0xFFFFFF45 records of 3D objects can be exploited to cause a heap-based buffer overflow. 10) A signedness error when processing the PAMI RIFF chunk can be exploited to corrupt memory. 11) An indexing error when processing the rcsL RIFF chunk can be exploited to corrupt heap-based memory and overwrite a function pointer via a specially crafted Director file with ".dir" or ".dcr" extensions. 12) An uninitialized pointer error when processing the tSAC RIFF chunk can be exploited to transfer the program flow into a random heap-based memory location. 13) A signedness error when processing the tSAC RIFF chunk can be exploited to corrupt heap-based memory. 14) A singedness error when processing the tSAC RIFF chunk can be exploited to write a NULL byte to a certain memory location. 15) An integer overflow error when processing 0xFFFFFFF8 records can be exploited to cause a heap-based buffer overflow via specially a crafted Director file with ".dir" or ".dcr" extensions. 16) An indexing error when processing the CSWV RIFF chunk within the IML32X.dll and DIRAPIX.dll modules can be exploited to corrupt heap-based memory. 17) An indexing error when processing the tSAC RIFF chunk within the DIRAPIX.dll module can be exploited to write a NULL byte to a heap-based memory location. 18) An integer overflow error in the TextXtra.x32 module can be exploited to cause a heap-based buffer overflow. 19) An unspecified error when processing ".dir" files in the DIRAPI.dll module can be exploited to corrupt memory. 20) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory. 21) An unspecified error when processing ".dir" files in the DIRAPI.dll module can be exploited to corrupt memory. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in versions prior to 11.5.8.612 running on Windows and Macintosh. SOLUTION: Update to version 11.5.8.612 or later. ORIGINAL ADVISORY: Adobe: http://www.adobe.com/support/security/bulletins/apsb10-20.html iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878 TippingPoint DVLabs: http://dvlabs.tippingpoint.com/advisory/TPTI-10-09 http://dvlabs.tippingpoint.com/advisory/TPTI-10-10 http://dvlabs.tippingpoint.com/advisory/TPTI-10-11 http://dvlabs.tippingpoint.com/advisory/TPTI-10-12 http://dvlabs.tippingpoint.com/advisory/TPTI-10-13 http://dvlabs.tippingpoint.com/advisory/TPTI-10-14 http://dvlabs.tippingpoint.com/advisory/TPTI-10-15 ZDI: http://www.zerodayinitiative.com/advisories/ZDI-10-160/ http://www.zerodayinitiative.com/advisories/ZDI-10-161/ http://www.zerodayinitiative.com/advisories/ZDI-10-162/ http://www.zerodayinitiative.com/advisories/ZDI-10-163/ http://www.zerodayinitiative.com/advisories/ZDI-10-164/ ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-