Advisory Details

October 29th, 2010

Adobe Shockwave Player Lnam Chunk String Processing Remote Code Execution Vulnerability

ZDI-10-227
ZDI-CAN-909

CVE ID CVE-2010-3655
CVSS SCORE 9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)
AFFECTED VENDORS Adobe
AFFECTED PRODUCTS Shockwave Player
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Shockwave Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the support for parsing Director movies. The .dir format is RIFF-based and is parsed mainly by the dirapi.dll module distributed with Shockwave. While parsing the Lnam chunk within a DIR file, the process attempts to extract a string into a fixed-length buffer located on the stack. The string is prefixed with a one byte size value. If the value is 0xFF the process blindly copies the following string until a NULL byte is found. This can be abused by an attacker to overflow the stack buffer and consequently execute arbitrary code under the context of the user running the browser.

ADDITIONAL DETAILS Adobe has issued an update to correct this vulnerability. More details can be found at:
http://www.adobe.com/support/security/bulletins/apsb10-25.html
DISCLOSURE TIMELINE
  • 2010-08-25 - Vulnerability reported to vendor
  • 2010-10-29 - Coordinated public release of advisory
CREDIT binaryproof
Aniway (Aniway.Anyway@gmail.com)
Anonymous
BACK TO ADVISORIES