Short Name |
HTTP:STC:ADOBE:TSAC-STRING |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Adobe Shockwave Director tSAC Chunk String Termination Memory Corruption |
Release Date |
2011/06/22 |
Update Number |
1943 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
A memory corruption vulnerability has been identified in Adobe Shockwave Player. The vulnerability is due to the software blindly using a string-size value, which is provided in the file, to null-terminate a string. This allows an attacker to write a null-byte at a controlled offset from the beginning of the string buffer. A remote attacker can exploit this vulnerability by enticing a target user to visit a maliciously crafted web site containing a specially crafted Adobe Director file. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. An unsuccessful exploit attempt may terminate the affected application abnormally.
Adobe Shockwave Player is prone to a remote memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to Adobe Shockwave Player 11.6.0.626 are vulnerable. NOTE: This issue was previously documented in BID 48270 (Adobe Shockwave Player APSB11-17 Multiple Remote Vulnerabilities) but has been given its own record to better document it.