This host is installed with Adobe Shockwave Player and is prone
to multiple remote code execution vulnerabilities.
###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_adobe_shockwave_player_mult_code_exe_vuln_may10.nasl 5263 2017-02-10 13:45:51Z teissa $
#
# Adobe Shockwave Player Multiple Remote Code Execution Vulnerabilities May-10
#
# Authors:
# Antu Sanadi <[email protected]>
#
# Copyright:
# Copyright (c) 2010 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################
tag_impact = "Successful exploitation will allow attacker to execute arbitrary code in
the context of the affected application by tricking a user into visiting a
specially crafted web page.
Impact Level: Application.";
tag_affected = "Adobe Shockwave Player prior to 11.5.7.609 on Windows.";
tag_insight = "Multiple flaws are caused by memory corruption errors, integer and buffer
overflows, array indexing, and signedness errors when processing malformed
'Shockwave' or 'Director' files, which could be exploited by attackers to
execute arbitrary code by tricking a user into visiting a specially crafted
web page.";
tag_solution = "Upgrade to Adobe Shockwave Player 11.5.7.609
http://get.adobe.com/shockwave/otherversions/";
tag_summary = "This host is installed with Adobe Shockwave Player and is prone
to multiple remote code execution vulnerabilities.";
if(description)
{
script_id(801335);
script_version("$Revision: 5263 $");
script_tag(name:"last_modification", value:"$Date: 2017-02-10 14:45:51 +0100 (Fri, 10 Feb 2017) $");
script_tag(name:"creation_date", value:"2010-05-19 14:50:39 +0200 (Wed, 19 May 2010)");
script_cve_id("CVE-2010-0127", "CVE-2010-0128", "CVE-2010-0129", "CVE-2010-0130",
"CVE-2010-1280", "CVE-2010-1281", "CVE-2010-1282", "CVE-2010-1283",
"CVE-2010-1284", "CVE-2010-1286", "CVE-2010-1287", "CVE-2010-1288",
"CVE-2010-1289", "CVE-2010-1290", "CVE-2010-1291", "CVE-2010-1292",
"CVE-2010-0987", "CVE-2010-0986");
script_bugtraq_id(40083, 40076, 40082, 40084, 40081, 40078, 40077, 40088, 40091,
40085, 40089, 40096, 40094, 40087, 40090, 40079, 40093, 40086);
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_name("Adobe Shockwave Player Multiple Remote Code Execution Vulnerabilities May-10");
script_xref(name : "URL" , value : "http://secunia.com/advisories/38751");
script_xref(name : "URL" , value : "http://www.zeroscience.mk/codes/shockwave_mem.txt");
script_xref(name : "URL" , value : "http://www.vupen.com/english/advisories/2010/1128");
script_xref(name : "URL" , value : "http://www.adobe.com/support/security/bulletins/apsb10-12.html");
script_xref(name : "URL" , value : "http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php");
script_xref(name : "URL" , value : "http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0139.html");
script_tag(name:"qod_type", value:"registry");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2010 Greenbone Networks GmbH");
script_family("General");
script_dependencies("secpod_adobe_shockwave_player_detect.nasl");
script_require_keys("Adobe/ShockwavePlayer/Ver");
script_tag(name : "impact" , value : tag_impact);
script_tag(name : "affected" , value : tag_affected);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
exit(0);
}
include("version_func.inc");
shockVer = get_kb_item("Adobe/ShockwavePlayer/Ver");
if(!shockVer){
exit(0);
}
# Check for versions prior to 11.5.7.609
if(version_is_less(version:shockVer, test_version:"11.5.7.609")){
security_message(0);
}