Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

Adobe Shockwave Player Multiple Vulnerabilities

-

Release Date:  2010-11-03    Last Update:  2011-02-14    Views:  13,068

Secunia Advisory SA42112

Where:

From remote

Impact:

System access

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Multiple vulnerabilities have been reported in Shockwave Player, which can be exploited by malicious people to compromise a user's system.

1) Insufficient input validation when verifying an offset inside a CSWV chunk can be exploited to manipulate values outside the bounds of an allocated heap buffer.

2) A signedness error when evaluating the size of certain data in a CSWV chunk can be exploited to manipulate values outside the bounds of an allocated heap buffer.

3) An integer overflow error when calculating the size of certain data in a CSWV chunk can be exploited to manipulate values outside the bounds of an allocated heap buffer.

4) A use-after-free error in an automatically installed compatibility component may result in a function in an unloaded library being called.

Successful exploitation of this vulnerability requires that a user is tricked into opening the "Shockwave Settings" window when viewing a web page.

5) An unspecified error can be exploited to corrupt memory.

6) An unspecified error when parsing a certain chunk can be exploited to corrupt memory.

7) An input validation error in dirapi.dll when parsing IFWV chunks can be exploited to corrupt memory.

8) An input validation error in the IML32 module when handling the global colour table size of a GIF image within a Director movie can be exploited to corrupt memory.

9) Improper calculation of an offset from several elements of a sub-structure referenced by the CSWV chunk can be exploited to corrupt memory.

10) An unspecified error can be exploited to corrupt memory.

11) Insufficient input validation when parsing 3D assets can be exploited to corrupt memory via a specially crafted record type 0xFFFFFF88.

12) An input validation error exists in an unspecified module.

13) An input validation error exists in dirapi.dll.

14) An input validation error exists in the TextXtra module.

15) An input validation error exists in the Shockwave 3d Asset module.

16) An unspecified error can be exploited to corrupt memory.

17) An unspecified error can be exploited to cause a buffer overflow.

18) A logic error in the TextXtra.x32 module when parsing DEMX chunks can be exploited to corrupt memory.

19) An error in the Font Xtra.x32 module when parsing PFR1 chunks can be exploited to corrupt memory.

20) An integer overflow error when parsing 3D assets can be exploited to corrupt memory via a specially crafted record type 0xFFFFFF45.

21) An signedness error in the Font Xtra.x32 module when parsing PFR1 chunks can be exploited to cause a buffer overflow.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in versions 11.5.9.615 and prior for Windows and Mac.


Solution:
Update to version 11.5.9.620.

Further details available to Secunia VIM customers

Provided and/or discovered by:
1-3) Carsten Eiram, Secunia Research.
4) Krystian Kloskowski (h07) via Secunia.
5, 12-15) Will Dormann, CERT/CC.
6) Andrzej Dyjak via iDefense.
7, 8, 18, 19, 21) Aaron Portnoy and Logan Brown, TippingPoint DVLabs.
9) Aniway and Luigi Auriemma via ZDI.
11) Aniway via ZDI.
20) An anonymous person via ZDI.

The vendor also credits:
10) An anonymous person via ZDI.
16, 17) IBM X-Force
21) Luigi Auriemma via ZDI.

Original Advisory:
Adobe:
http://www.adobe.com/support/security/bulletins/apsb11-01.html

Secunia Research:
http://secunia.com/secunia_research/2011-3/
http://secunia.com/secunia_research/2011-4/
http://secunia.com/secunia_research/2011-5/

iDefense:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-11-078/
http://www.zerodayinitiative.com/advisories/ZDI-11-079/
http://www.zerodayinitiative.com/advisories/ZDI-11-080/

TippingPoint DVLabs:
http://dvlabs.tippingpoint.com/advisory/TPTI-11-01
http://dvlabs.tippingpoint.com/advisory/TPTI-11-02
http://dvlabs.tippingpoint.com/advisory/TPTI-11-03
http://dvlabs.tippingpoint.com/advisory/TPTI-11-04
http://dvlabs.tippingpoint.com/advisory/TPTI-11-05

US-CERT (VU#189929):
http://www.kb.cert.org/vuls/id/189929

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Adobe Shockwave Player Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability