|
|
| |
Credit:
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-10-228/
|
| |
Vulnerable Systems:
* Adobe Shockwave Player
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within code responsible for parsing Director files (.dir). When handling the 3D record type 0xFFFFFF89. The module trusts size fields within a substructure and can be forced to make a faulty memory allocation. This can be abused by a remote attacker to execute arbitrary code under the context of the currently logged-in user.
Patch Availability:
Adobe has issued an update to correct this vulnerability at:
http://www.adobe.com/support/security/bulletins/apsb10-25.html
CVE Information:
CVE-2010-4090
Disclosure Timeline:
2010-09-24 - Vulnerability reported to vendor
2010-10-29 - Coordinated public release of advisory
|
|
|