Short Name |
HTTP:STC:ADOBE:XFIR-KEY |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Adobe Shockwave Director File KEY Chunk Parsing Buffer Overflow |
Release Date |
2011/06/27 |
Update Number |
1945 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
A buffer overflow vulnerability exists in Adobe Shockwave Player. The vulnerability is due to an error allocating a buffer for the KEY* element in a Director file, which leads to copying data from the file past the end of this buffer. A remote attacker can exploit this vulnerability by enticing a target user to visit a maliciously crafted web site. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. An unsuccessful exploit attempt may terminate the affected application abnormally.
Adobe Shockwave Player is prone to multiple remote memory-corruption vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to Adobe Shockwave Player 11.6.0.626 are vulnerable. NOTE: These issues were previously documented in BID 48270 (Adobe Shockwave Player APSB11-17 Multiple Remote Vulnerabilities) but have been given their own record to better document them.