Movatterモバイル変換


[0]ホーム

URL:


Home page logo
bugtraq logo

Bugtraqmailing list archives

PreviousBy DateNext
PreviousBy ThreadNext

TPTI-10-11: Adobe Shockwave tSAC Chunk Pointer Offset Memory Corruption Remote Code Execution Vulnerability


From: ZDI Disclosures <zdi-disclosures () tippingpoint com>
Date: Tue, 24 Aug 2010 16:33:29 -0500

TPTI-10-11: Adobe Shockwave tSAC Chunk Pointer Offset Memory Corruption Remote Code Execution Vulnerabilityhttp://dvlabs.tippingpoint.com/advisory/TPTI-10-11August 24, 2010-- CVE ID:CVE-2010-2874 -- CVSS:9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)-- Affected Vendors:Adobe-- Affected Products:Adobe Shockwave Player-- Vulnerability Details:This vulnerability allows remote attackers to execute arbitrary code onvulnerable installations of Adobe Shockwave Player. User interaction isrequired to exploit this vulnerability in that the target must visit amalicious page or open a malicious file.The specific flaw exists within DIRAPIX.dll which is responsible forparsing the Director movies, a RIFF-based file format. The codesign-extends a value from the input file and uses it as an offset toseek into a heap buffer before performing a write operation. By craftingparticular values for this field, an attacker can force the process toseek beyond the allocated bounds of the buffer. This can be leveraged byan attacker to execute arbitrary code under the context of the userrunning the web browser.-- Vendor Response:Adobe has issued an update to correct this vulnerability. Moredetails can be found at:http://www.adobe.com/support/security/bulletins/apsb10-20.html-- Disclosure Timeline:2010-08-11 - Vulnerability reported to vendor2010-08-24 - Coordinated public release of advisory-- Credit:This vulnerability was discovered by:    * Aaron Portnoy, Logan Brown, and Team lollersk8erz

PreviousBy DateNext
PreviousBy ThreadNext

Current thread:


[8]ページ先頭

©2009-2026 Movatter.jp