Advisory Details

June 24th, 2009

Adobe Shockwave Player Director File Parsing Pointer Overwrite Vulnerability

ZDI-09-044
ZDI-CAN-327

CVE ID CVE-2009-1860
CVSS SCORE
AFFECTED VENDORS Adobe
AFFECTED PRODUCTS Shockwave Player
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['5764']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute code on vulnerable installations of Adobe's Shockwave Player. User interaction is required in that a user must visit a malicious web site.

The specific flaw exists when the Shockwave player attempts to load a specially crafted Adobe Director File. When a malicious value is used during a memory dereference a possible 4-byte memory overwrite may occur. Exploitation can lead to remote system compromise under the credentials of the currently logged in user.

ADDITIONAL DETAILS Adobe has issued an update to correct this vulnerability. More details can be found at:
http://www.adobe.com/support/security/bulletins/apsb09-08.html
DISCLOSURE TIMELINE
  • 2008-05-12 - Vulnerability reported to vendor
  • 2009-06-24 - Coordinated public release of advisory
CREDIT Paul Kurczaba
BACK TO ADVISORIES