Advisories Blog | G5 Cyber Security

Adobe Shockwave Player Director File Parsing RCSL Pointer Overwrite

Code Audit Labs has discovered a vulnerability allows remote attackers to execute code on vulnerable installations of Adobe’s Shockwave Player. User interaction is required in that a user must visit a malicious web site. The specific flaw exists when the Shockwave player attempts to load a specially crafted Adobe Director File. When a malicious value is used during a memory dereference a possible 4-byte memory overwrite may occur. Exploitation can lead to remote system compromise under the credentials of the currently logged in user.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/89432/CAL-20100204-3.txt

Source: https://packetstormsecurity.com/files/89432/Adobe-Shockwave-Player-Director-File-Parsing-RCSL-Pointer-Overwrite.html

Exit mobile version