10 Aug 2011
02 Dec 2011
Adobe Shockwave Player 11.x
This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.
Multiple vulnerabilities have been reported in Shockwave Player, which can be exploited by malicious people to compromise a user' system.
1) An unspecified error can be exploited to corrupt memory.
2) An unspecified error can be exploited to corrupt memory.
3) An error within IML32.dll when parsing DEMX chunks from director files can be exploited to corrupt memory.
4) An unspecified error can be exploited to corrupt memory.
5) An error within Dirapi.dll when parsing a certain field in a dir file can be exploited to corrupt memory.
6) Missing check of a return value within a function in TextXtra.x32 when parsing XMED chunk data can be exploited to cause a heap-based buffer overflow.
7) An unspecified error in the bundled version of msvcr90.dll can be exploited to corrupt memory.
Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
The vulnerabilities are reported in version 188.8.131.526 and prior for Windows and Macintosh.
Update to version 184.108.40.2069.
3) Logan Brown, TippingPoint DVLabs
The vendor credits: