Short Name |
HTTP:STC:ADOBE:XFIR-PAMI-RCE |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Adobe Shockwave Player DIR Files PAMI Chunk Code Execution |
Release Date |
2010/10/07 |
Update Number |
1787 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Adobe Shockwave Player. It is due to an input validation error while parsing specially crafted PAMI RIFF chunk data in a DIR file. The vulnerable code does not validate an offset value provided in the chunk data before using it to calculate a memory pointer. Remote attackers can exploit this by enticing target users to open a malicious DIR file using a vulnerable version of the product. A successful attack can result in arbitrary code execution in the security context of the logged in user.
Adobe Shockwave Player is prone to a remote code-execution vulnerability. Attackers can exploit this issue to crash the affected application and execute arbitrary code. Adobe Shockwave Player 11.5.6.606 and prior are vulnerable. NOTE: This issue was previously discussed in BID 40066 (Adobe Shockwave Player APSB10-12 Multiple Remote Vulnerabilities) but has been given its own record to better document it.