English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Adobe Shockwave Player Multiple Vulnerabilities


Secunia ID

SA42112

CVE-ID

CVE-2010-2587, CVE-2010-2588, CVE-2010-2589, CVE-2010-4092, CVE-2010-4093, CVE-2010-4187, CVE-2010-4188, CVE-2010-4189, CVE-2010-4190, CVE-2010-4191, CVE-2010-4192, CVE-2010-4193, CVE-2010-4194, CVE-2010-4195, CVE-2010-4196, CVE-2010-4306, CVE-2010-4307, CVE-2011-0555, CVE-2011-0556, CVE-2011-0557, CVE-2011-0569

Release Date

03 Nov 2010

Last Change

14 Feb 2011

Criticality

Highly Critical

Solution Status

Vendor Patch

Software

Adobe Shockwave Player 11.x

Where

From remote

Impact
System access

This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Description

Multiple vulnerabilities have been reported in Shockwave Player, which can be exploited by malicious people to compromise a user's system.

1) Insufficient input validation when verifying an offset inside a CSWV chunk can be exploited to manipulate values outside the bounds of an allocated heap buffer.

2) A signedness error when evaluating the size of certain data in a CSWV chunk can be exploited to manipulate values outside the bounds of an allocated heap buffer.

3) An integer overflow error when calculating the size of certain data in a CSWV chunk can be exploited to manipulate values outside the bounds of an allocated heap buffer.

4) A use-after-free error in an automatically installed compatibility component may result in a function in an unloaded library being called.

Successful exploitation of this vulnerability requires that a user is tricked into opening the "Shockwave Settings" window when viewing a web page.

5) An unspecified error can be exploited to corrupt memory.

6) An unspecified error when parsing a certain chunk can be exploited to corrupt memory.

7) An input validation error in dirapi.dll when parsing IFWV chunks can be exploited to corrupt memory.

8) An input validation error in the IML32 module when handling the global colour table size of a GIF image within a Director movie can be exploited to corrupt memory.

9) Improper calculation of an offset from several elements of a sub-structure referenced by the CSWV chunk can be exploited to corrupt memory.

10) An unspecified error can be exploited to corrupt memory.

11) Insufficient input validation when parsing 3D assets can be exploited to corrupt memory via a specially crafted record type 0xFFFFFF88.

12) An input validation error exists in an unspecified module.

13) An input validation error exists in dirapi.dll.

14) An input validation error exists in the TextXtra module.

15) An input validation error exists in the Shockwave 3d Asset module.

16) An unspecified error can be exploited to corrupt memory.

17) An unspecified error can be exploited to cause a buffer overflow.

18) A logic error in the TextXtra.x32 module when parsing DEMX chunks can be exploited to corrupt memory.

19) An error in the Font Xtra.x32 module when parsing PFR1 chunks can be exploited to corrupt memory.

20) An integer overflow error when parsing 3D assets can be exploited to corrupt memory via a specially crafted record type 0xFFFFFF45.

21) An signedness error in the Font Xtra.x32 module when parsing PFR1 chunks can be exploited to cause a buffer overflow.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in versions 11.5.9.615 and prior for Windows and Mac.

Solution

Update to version 11.5.9.620.
https://get.adobe.com/shockwave/

Reported by

1-3) Carsten Eiram, Secunia Research.
4) Krystian Kloskowski (h07) via Secunia.
5, 12-15) Will Dormann, CERT/CC.
6) Andrzej Dyjak via iDefense.
7, 8, 18, 19, 21) Aaron Portnoy and Logan Brown, TippingPoint DVLabs.
9) Aniway and Luigi Auriemma via ZDI.
11) Aniway via ZDI.
20) An anonymous person via ZDI.

The vendor also credits:
10) An anonymous person via ZDI.
16, 17) IBM X-Force
21) Luigi Auriemma via ZDI.

Original Advisory

Adobe:
http://www.adobe.com/support/security/bulletins/apsb11-01.html

Secunia Research:
http://secunia.com/secunia_research/2011-3/
http://secunia.com/secunia_research/2011-4/
http://secunia.com/secunia_research/2011-5/

iDefense:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=892

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-11-078/
http://www.zerodayinitiative.com/advisories/ZDI-11-079/
http://www.zerodayinitiative.com/advisories/ZDI-11-080/

TippingPoint DVLabs:
http://dvlabs.tippingpoint.com/advisory/TPTI-11-01
http://dvlabs.tippingpoint.com/advisory/TPTI-11-02
http://dvlabs.tippingpoint.com/advisory/TPTI-11-03
http://dvlabs.tippingpoint.com/advisory/TPTI-11-04
http://dvlabs.tippingpoint.com/advisory/TPTI-11-05

US-CERT (VU#189929):
http://www.kb.cert.org/vuls/id/189929