Details: Vulnerable Systems:
Adobe Shockwave Player
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the CASt chunk inside Adobe's RIFF-based Director file format. The code within the Dirapi.dll module does not properly check a size value used for a memmove. This can lead to memory corruption which can be leveraged to execute arbitrary code under the context of the user running the browser.
Disclosure Timeline:
2011-04-20 - Vulnerability reported to vendor
2011-06-14 - Coordinated public release of advisory
Additional Information:
This vulnerability was discovered by Luigi Auriemma and Donato Ferrante
http://www.zerodayinitiative.com/advisories/ZDI-11-214/