HTTP: Adobe Shockwave Director tSAC Chunk Parsing Memory Corruption

This signature detects attempts to exploit a known code execution vulnerability in Adobe Shockwave player. It is due to a signedness error while parsing tSAC chunks in Adobe Director files. By providing a certain negative value, calculation of a pointer can lead to a memory corruption. Remote attackers can exploit this by enticing target users to open a malicious DIR file using a vulnerable version of the product. A successful attack can result in arbitrary code execution in the security context of the logged in user. In an unsuccessful attack, the affected application can terminate abnormally.

Extended Description

Adobe Shockwave Player is prone to a remote memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed attacks may cause a denial-of-service condition. Adobe Shockwave Player 11.5.7.609 and prior are vulnerable. NOTE: This issue was previously covered in BID 42657 (Adobe Shockwave Player APSB10-20 Multiple Remote Vulnerabilities) but has been given its own record to better document it.

Affected Products

Adobe shockwave_player

References

BugTraq: 42665

CVE: CVE-2010-2866

Short Name
HTTP:STC:ADOBE:XFIR-TSAC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Adobe CVE-2010-2866 Chunk Corruption Director Memory Parsing Shockwave bid:42665 tSAC
Release Date
11/01/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Adobe

CVSS Score

9.3

Found a potential security threat?