Short Name |
HTTP:STC:ADOBE:XFIR-PAMM-MEM |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Adobe Shockwave Director pamm Chunk Memory Corruption |
Release Date |
2010/11/01 |
Update Number |
1806 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known code execution vulnerability in Adobe Shockwave player. It is due to insufficient validation of certain values in a pamm chunk of a Director file. Remote attackers can exploit this by enticing target users to open a malicious DIR file using a vulnerable version of the product. A successful attack can result in arbitrary code execution in the security context of the logged in user. In an unsuccessful attack, the affected application can terminate abnormally.
Adobe Shockwave Player is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed attacks may cause a denial-of-service condition. Adobe Shockwave Player versions prior to 11.5.9.615 are vulnerable.