Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/509053/100/0/threaded | mailing list |
http://secunia.com/secunia_research/2009-63/ | vendor advisory |
http://secunia.com/advisories/37888 | third party advisory vendor advisory |
http://securitytracker.com/id?1023481 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8538 | signature vdb entry |
http://secunia.com/secunia_research/2010-1/ | vendor advisory |
http://www.securityfocus.com/archive/1/509055/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/37872 | vdb entry |
http://secunia.com/secunia_research/2009-62/ | vendor advisory |
http://www.vupen.com/english/advisories/2010/0171 | vdb entry vendor advisory |
http://www.adobe.com/support/security/bulletins/apsb10-03.html | patch vendor advisory |
http://www.securityfocus.com/archive/1/509058/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55759 | vdb entry |