HTTP: Adobe Shockwave Director pamm Chunk Memory Corruption

This signature detects attempts to exploit a known code execution vulnerability in Adobe Shockwave player. It is due to insufficient validation of certain values in a pamm chunk of a Director file. Remote attackers can exploit this by enticing target users to open a malicious DIR file using a vulnerable version of the product. A successful attack can result in arbitrary code execution in the security context of the logged in user. In an unsuccessful attack, the affected application can terminate abnormally.

Extended Description

Adobe Shockwave Player is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed attacks may cause a denial-of-service condition. Adobe Shockwave Player versions prior to 11.5.9.615 are vulnerable.

Affected Products

Adobe shockwave_player

References

BugTraq: 44520

CVE: CVE-2010-4084

Short Name
HTTP:STC:ADOBE:XFIR-PAMM-MEM
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Adobe CVE-2010-4084 Chunk Corruption Director Memory Shockwave bid:44520 pamm
Release Date
11/01/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Adobe

CVSS Score

9.3

Found a potential security threat?