Short Name |
HTTP:STC:DL:SHOCKWAVE-3D-RCE |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Adobe Shockwave Player 3D Parsing Routine Remote Code Execution |
Release Date |
2011/04/19 |
Update Number |
1904 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known code execution vulnerability in Adobe Shockwave player.Its due to a memory-corruption in the 3D parsing routine when handling type '0xFFFFFF88' records.A successful attack can lead to arbitrary code execution.
Adobe Shockwave Player is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the user running the affected application. Failed attempts will likely cause a denial-of-service condition. Versions prior to Shockwave Player 11.5.9.620 are vulnerable. NOTE: This issue was originally discussed in BID 46284 (Adobe Shockwave Player APSB11-01 Multiple Remote Vulnerabilities) but has been given its own record to better document it.