HTTP: Adobe Shockwave Player rcsL Chunk Parsing Remote Code Execution

This signature detects attempts to exploit a known vulnerability in Adobe Shockwave Player. It is due to insufficient validation of user-supplied input. A remote attacker can exploit this by enticing a target to open a malicious URL link. A successful attack can result in arbitrary code execution.

Extended Description

Adobe Shockwave Player is prone to multiple memory corruption vulnerabilities. Attackers can exploit these issues to crash the affected application and execute arbitrary code within the context of the affected application. Versions prior to Adobe Shockwave Player 11.6.4.634 are vulnerable.

Affected Products

Adobe shockwave_player

Short Name
HTTP:STC:ADOBE:SHOCKWAVE-RCSL
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Adobe CVE-2012-2030 Chunk Code Execution Parsing Player Remote Shockwave bid:53420 rcsL
Release Date
05/29/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Adobe

CVSS Score

10.0

Found a potential security threat?