HTTP: Adobe Shockwave Player DIR Files PAMI Chunk Code Execution
This signature detects attempts to exploit a known vulnerability in Adobe Shockwave Player. It is due to an input validation error while parsing specially crafted PAMI RIFF chunk data in a DIR file. The vulnerable code does not validate an offset value provided in the chunk data before using it to calculate a memory pointer. Remote attackers can exploit this by enticing target users to open a malicious DIR file using a vulnerable version of the product. A successful attack can result in arbitrary code execution in the security context of the logged in user.
Extended Description
Adobe Shockwave Player is prone to a remote code-execution vulnerability. Attackers can exploit this issue to crash the affected application and execute arbitrary code. Adobe Shockwave Player 11.5.6.606 and prior are vulnerable. NOTE: This issue was previously discussed in BID 40066 (Adobe Shockwave Player APSB10-12 Multiple Remote Vulnerabilities) but has been given its own record to better document it.
Affected Products
Adobe shockwave_player
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Adobe
9.3