HTTP: Adobe Shockwave Director File KEY Chunk Parsing Buffer Overflow

A buffer overflow vulnerability exists in Adobe Shockwave Player. The vulnerability is due to an error allocating a buffer for the KEY* element in a Director file, which leads to copying data from the file past the end of this buffer. A remote attacker can exploit this vulnerability by enticing a target user to visit a maliciously crafted web site. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. An unsuccessful exploit attempt may terminate the affected application abnormally.

Extended Description

Adobe Shockwave Player is prone to multiple remote memory-corruption vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to Adobe Shockwave Player 11.6.0.626 are vulnerable. NOTE: These issues were previously documented in BID 48270 (Adobe Shockwave Player APSB11-17 Multiple Remote Vulnerabilities) but have been given their own record to better document them.

Affected Products

Adobe shockwave_player

References

BugTraq: 48300

CVE: CVE-2011-2111

Short Name
HTTP:STC:ADOBE:XFIR-KEY
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Adobe Buffer CVE-2011-2111 Chunk Director File KEY Overflow Parsing Shockwave bid:48300
Release Date
06/27/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Adobe

CVSS Score

9.3

Found a potential security threat?