Page 33 of 173 results (0.010 seconds)

CVSS: 10.0EPSS: 18%CPEs: 23EXPL: 0

The implementation of pami RIFF chunk parsing in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file. La validación de los paquetes de pami RIFF en Adobe Shockwave Player anterior a v11.5.7.609 no valida un valor determinado desde un fichero antes de realizar los cálculos del puntero al fichero, el cuál permite a atacantes remotos ejecutar código a su elección o causar una denegación del servicio (corrupción de memoria) a través de la manipulación del fichero .dir (conocido como Director) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the code responsible for parsing Director files. When the application parses the pami RIFF chunk, it trusts an offset value and seeks into the file data. If provided with signed values in the data at the given offset, the process can be made to incorrectly calculate a pointer and operate on the data at it's location. • http://secunia.com/advisories/38751 http://www.adobe.com/support/security/bulletins/apsb10-12.html http://www.securityfocus.com/archive/1/511242/100/0/threaded http://www.vupen.com/english/advisories/2010/1128 http://www.zerodayinitiative.com/advisories/ZDI-10-089 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7416 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 46%CPEs: 3EXPL: 0

iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file. iml32.dll en Adobe Shockwave Player en versiones anteriores a la 11.5.7.609 no valida un cierto valor de un archivo antes de usarlo en los cálculos de punteros de ficheros, lo que permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (corrupción de memoria) mediante un fichero .dir (también conocido como Director) manipulado. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Shockwave. User interaction is required in that a target visit a malicious website. The specific flaw exists within the code responsible for parsing Director files. The vulnerable function is exported as an ordinal from the iml32.dll module. Ordinal 1409 trusts a value from the file as an offset and updates pointers accordingly. • http://secunia.com/advisories/38751 http://www.adobe.com/support/security/bulletins/apsb10-12.html http://www.securityfocus.com/archive/1/511252/100/0/threaded http://www.vupen.com/english/advisories/2010/1128 http://www.zerodayinitiative.com/advisories/ZDI-10-087 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7268 • CWE-787: Out-of-bounds Write •

CVSS: 9.3EPSS: 34%CPEs: 15EXPL: 0

Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606 allows remote attackers to execute arbitrary code via a crafted 3D model in a Shockwave file. Desbordamiento de búfer basado en memoria dinámica (heap) en Adobe Shockwave Player anterior a v11.5.6.606, permite a atacantes remotos ejecutar código de su elección a través de un modelo manipulado en 3D en un archivo Shockwave • http://secunia.com/advisories/37888 http://secunia.com/secunia_research/2009-61 http://securitytracker.com/id?1023481 http://www.adobe.com/support/security/bulletins/apsb10-03.html http://www.securityfocus.com/archive/1/509062/100/0/threaded http://www.securityfocus.com/bid/37870 http://www.vupen.com/english/advisories/2010/0171 https://exchange.xforce.ibmcloud.com/vulnerabilities/55758 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8311 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 21%CPEs: 15EXPL: 0

Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption. Múltiples desbordamiento de búfer basados en entero en Adobe Shockwave Player en versiones anteriores a la 11.5.6.606 permiten a atacantes remotos ejecutar código de su elección mediante (1) un tipo de bloque no especificado en un fichero Shockwave, que genera un desbordamiento de búfer basado en pila; y pueden permitir a atacantes remotos ejecutar código de su elección mediante (2) un bloque 3D no especificado en un fichero Shockwave que genera una corrupción de memoria; o (3) un modelo 3D manipulado en un fichero Shockwave que genera una corrupción de la pila. • http://secunia.com/advisories/37888 http://secunia.com/secunia_research/2009-62 http://secunia.com/secunia_research/2009-63 http://secunia.com/secunia_research/2010-1 http://securitytracker.com/id?1023481 http://www.adobe.com/support/security/bulletins/apsb10-03.html http://www.securityfocus.com/archive/1/509053/100/0/threaded http://www.securityfocus.com/archive/1/509055/100/0/threaded http://www.securityfocus.com/archive/1/509058/100/0/threaded http://www.securityfocus&# • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 4%CPEs: 14EXPL: 0

Adobe Shockwave Player before 11.5.2.602 allows remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption, related to an "invalid string length vulnerability." NOTE: some of these details are obtained from third party information. Adobe Shockwave Player anterior a v11.5.2.602, permite a atacantes remotos ejecutar código de su elección a través de una página web manipulada que provoca una corrupción de memoria. Relacionado con la "vulnerabilidad de longitud de cadena inválida". NOTA: algunos de estos detalles han sido obtenidos a partir de información de terceros. • http://securitytracker.com/id?1023123 http://www.adobe.com/support/security/bulletins/apsb09-16.html http://www.securityfocus.com/bid/36905 http://www.vupen.com/english/advisories/2009/3134 https://exchange.xforce.ibmcloud.com/vulnerabilities/54121 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6395 • CWE-399: Resource Management Errors •