---------------------------------------------------------------------- Secunia receives 'Frost & Sullivan's Global 2010 Customer Value Enhancement Award Secunia outshines its competitors and receives the Frost & Sullivan’s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost & Sullivan concluded: "Secunia provides tremendous value for their customers, end-users, and to other security vendors." Read more: http://secunia.com/blog/117/ ---------------------------------------------------------------------- TITLE: Adobe Shockwave Player Multiple Vulnerabilities SECUNIA ADVISORY ID: SA41065 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41065/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41065 RELEASE DATE: 2010-08-26 DISCUSS ADVISORY: http://secunia.com/advisories/41065/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/41065/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=41065 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Adobe Shockwave Player, which can be exploited by malicious people to compromise a user's system. 1) An unspecified error can be exploited to corrupt memory. 2) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory. 3) A third unspecified error can be exploited to corrupt memory. 4) A signedness error when processing the tSAC RIFF chunk in the DIRAPI module can be exploited to corrupt memory. 5) An array indexing error when processing the rcsL RIFF chunk in the DIRAPIX module can be exploited to corrupt memory. 6) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory. 7) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory. 8) A boundary error when handling the chunk size following the fourCC value in Ordinal1111 (IML32X module) can be exploited to cause a heap-based buffer overflow via a specially crafted RIFF file. 9) An integer overflow error when processing 0xFFFFFF45 records of 3D objects can be exploited to cause a heap-based buffer overflow. 10) A signedness error when processing the PAMI RIFF chunk can be exploited to corrupt memory. 11) An indexing error when processing the rcsL RIFF chunk can be exploited to corrupt heap-based memory and overwrite a function pointer via a specially crafted Director file with ".dir" or ".dcr" extensions. 12) An uninitialized pointer error when processing the tSAC RIFF chunk can be exploited to transfer the program flow into a random heap-based memory location. 13) A signedness error when processing the tSAC RIFF chunk can be exploited to corrupt heap-based memory. 14) A singedness error when processing the tSAC RIFF chunk can be exploited to write a NULL byte to a certain memory location. 15) An integer overflow error when processing 0xFFFFFFF8 records can be exploited to cause a heap-based buffer overflow via specially a crafted Director file with ".dir" or ".dcr" extensions. 16) An indexing error when processing the CSWV RIFF chunk within the IML32X.dll and DIRAPIX.dll modules can be exploited to corrupt heap-based memory. 17) An indexing error when processing the tSAC RIFF chunk within the DIRAPIX.dll module can be exploited to write a NULL byte to a heap-based memory location. 18) An integer overflow error in the TextXtra.x32 module can be exploited to cause a heap-based buffer overflow. 19) An unspecified error when processing ".dir" files in the DIRAPI.dll module can be exploited to corrupt memory. 20) An unspecified error when processing ".dir" files in the IML32.dll module can be exploited to corrupt memory. 21) An unspecified error when processing ".dir" files in the DIRAPI.dll module can be exploited to corrupt memory. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in versions prior to 11.5.8.612 running on Windows and Macintosh. SOLUTION: Update to version 11.5.8.612 or later. PROVIDED AND/OR DISCOVERED BY: 4,5,8,13,16,17,18) Aaron Portnoy, TippingPoint DVLabs. 9,12,15) An anonymous person, reported via ZDI. 10,11) Damian Put, reported via ZDI. 14) An anonymous person, reported via iDefense VCP. 2,6,7,19,20,21) Rodrigo Rubira Branco, Check Point. The vendor also credits: 1,2,3) Honggang Ren, Fortinet's FortiGuard Labs ORIGINAL ADVISORY: Adobe: http://www.adobe.com/support/security/bulletins/apsb10-20.html iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=878 TippingPoint DVLabs: http://dvlabs.tippingpoint.com/advisory/TPTI-10-09 http://dvlabs.tippingpoint.com/advisory/TPTI-10-10 http://dvlabs.tippingpoint.com/advisory/TPTI-10-11 http://dvlabs.tippingpoint.com/advisory/TPTI-10-12 http://dvlabs.tippingpoint.com/advisory/TPTI-10-13 http://dvlabs.tippingpoint.com/advisory/TPTI-10-14 http://dvlabs.tippingpoint.com/advisory/TPTI-10-15 ZDI: http://www.zerodayinitiative.com/advisories/ZDI-10-160/ http://www.zerodayinitiative.com/advisories/ZDI-10-161/ http://www.zerodayinitiative.com/advisories/ZDI-10-162/ http://www.zerodayinitiative.com/advisories/ZDI-10-163/ http://www.zerodayinitiative.com/advisories/ZDI-10-164/ Rodrigo Rubira Branco: http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0282.html http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0283.html http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0284.html http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0285.html http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0286.html http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0287.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------