English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Adobe Shockwave Player Multiple Vulnerabilities


Secunia ID

SA47932

CVE-ID

CVE-2012-0757, CVE-2012-0758, CVE-2012-0759, CVE-2012-0760, CVE-2012-0761, CVE-2012-0762, CVE-2012-0763, CVE-2012-0764, CVE-2012-0766

Release Date

14 Feb 2012

Last Change

15 Feb 2012

Criticality

Highly Critical

Solution Status

Vendor Patch

Software

Adobe Shockwave Player 11.x

Where

From remote

Impact
System access

This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Description

Multiple vulnerabilities have been reported in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system.

1) An unspecified error in the Shockwave 3D Asset can be exploited to corrupt memory.

2) An integer overflow error in dirapi.dll when allocating memory during the parsing of the CUPT atom can be exploited to cause a heap-based buffer overflow.

3) An error when parsing the KEY atom can be exploited to corrupt memory and overwrite a certain pointer.

4) An unspecified error in the Shockwave 3D Asset can be exploited to corrupt memory.

5) An unspecified error in the Shockwave 3D Asset can be exploited to corrupt memory.

6) An unspecified error in the Shockwave 3D Asset can be exploited to corrupt memory.

7) An unspecified error in the Shockwave 3D Asset can be exploited to corrupt memory.

8) An unspecified error in the Shockwave 3D Asset can be exploited to corrupt memory.

9) An unspecified error in the Shockwave 3D Asset can be exploited to corrupt memory.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in versions 11.6.3.633 and prior for Windows and Macintosh.

Solution

Update to version 11.6.4.634.
http://get.adobe.com/shockwave/

Reported by

1, 4-9) The vendor credits Honggang Ren, Fortinet's FortiGuard Labs
2, 3) instruder, Code Audit Labs of vulnhunt.com

Original Advisory

Adobe:
http://www.adobe.com/support/security/bulletins/apsb12-02.html

Code Audit Labs:
http://blog.vulnhunt.com/index.php/2012/02/15/cal-2011-0071_adobe-shockwave-player-parsing-cupt-atom-heap-overflow/
http://blog.vulnhunt.com/index.php/2012/02/15/cal-2011-0055_adobe-shockwave-player-parsing-block_cout-memory-corruption-vulnerability/