English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Adobe Shockwave Player Multiple Vulnerabilities


Secunia ID

SA49086

CVE-ID

CVE-2012-2029, CVE-2012-2030, CVE-2012-2031, CVE-2012-2032, CVE-2012-2033

Release Date

09 May 2012

Last Change

10 May 2012

Criticality

Highly Critical

Solution Status

Vendor Patch

Software

Adobe Shockwave Player 11.x

Where

From remote

Impact
System access

This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

Description

Multiple vulnerabilities have been reported in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system.

1) An error within the IMLLib module when parsing a .dir (Adobe Director) file can be exploited to corrupt memory via a specially crafted file.

2) An error within the DPLib module when parsing a .dir file can be exploited to corrupt memory via a specially crafted file.

3) An error within the IMLLib module when parsing a .dir file can be exploited to corrupt memory via a specially crafted file.

4) Another unspecified error can be exploited to corrupt memory.

5) Another unspecified error can be exploited to corrupt memory.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in versions 11.6.4.634 and prior for Windows and Macintosh.

Solution

Update to version 11.6.5.635.

Reported by

1 - 3) Rodrigo Rubira Branco, Qualys Vulnerability & Malware Research Labs.
4, 5) The vendor credits Honggang Ren, Fortinet's FortiGuard Labs.

Original Advisory

Adobe (APSB12-13):
http://www.adobe.com/support/security/bulletins/apsb12-13.html

Rodrigo Rubira Branco:
https://community.qualys.com/docs/DOC-3513
https://community.qualys.com/docs/DOC-3514
https://community.qualys.com/docs/DOC-3515