Lucene search

K
saintSAINT CorporationSAINT:CB42C102BC2CFEA2E6A8F067BAB0C4DB
HistoryNov 08, 2010 - 12:00 a.m.

Adobe Shockwave Player Lnam Chunk Processing Buffer Overflow

2010-11-0800:00:00
SAINT Corporation
download.saintcorporation.com
13

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.629 Medium

EPSS

Percentile

97.9%

Added: 11/08/2010
CVE: CVE-2010-3655
BID: 44516

Background

Adobe Shockwave is a multimedia player used to add animation and interactivity to web pages. It allows Adobe Director applications to be published on the Internet and viewed in a web browser on any computer which has the Shockwave plug-in installed.

Problem

A code execution vulnerability exists in Adobe Shockwave. The vulnerability is due to a buffer overflow in **DIRAPI.dll** while parsing a value from a **Lnam** chunk record. A remote attacker can exploit this vulnerability by enticing a user to open a malicious file. This could result in arbitrary remote code execution in the security context of the logged in user.

Resolution

Upgrade to the newest version of Adobe Shockwave Player as described in Security Bulletin APSB10-25.

References

<http://www.zerodayinitiative.com/advisories/ZDI-10-227/&gt;

Limitations

Exploit works on Adobe Systems Shockwave Player 11.5.8.612.

The user must open the exploit page in Internet Explorer 6 or 7.

Platforms

Windows

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.629 Medium

EPSS

Percentile

97.9%

Related for SAINT:CB42C102BC2CFEA2E6A8F067BAB0C4DB