|
|
|
|
| |
Credit:
The information has been provided by Luigi Auriemma.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-12-041/
|
| |
Vulnerable Systems:
* Adobe Shockwave Player 11.5.9.620 and prior
Immune Systems:
* Adobe Shockwave Player 11.5.9.626
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the Shockwave 3d Asset.x32 module responsible for parsing 3D record types within RIFF-based Director files. The code within this module trusts invalid size checks to prevent integer wraps. Due to invalid compares, an integer overflow can occur when processing the data section of DEMX chunks, which subsequently leads to a heap-based buffer overflow. This can be leveraged to execute remote code under the context of the user running the browser.
Vendor Status:
Adobe has issued an update to correct this vulnerability.
Patch Availability:
http://www.adobe.com/support/security/bulletins/apsb11-17.html
CVE Information:
CVE-2011-2113
Disclosure Timeline:
2011-05-25 - Vulnerability reported to vendor
2012-03-01 - Coordinated public release of advisory
|
|
|
|
|