HTTP: Adobe Shockwave Player 3D Parsing Routine Remote Code Execution
This signature detects attempts to exploit a known code execution vulnerability in Adobe Shockwave player.Its due to a memory-corruption in the 3D parsing routine when handling type '0xFFFFFF88' records.A successful attack can lead to arbitrary code execution.
Extended Description
Adobe Shockwave Player is prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the user running the affected application. Failed attempts will likely cause a denial-of-service condition. Versions prior to Shockwave Player 11.5.9.620 are vulnerable. NOTE: This issue was originally discussed in BID 46284 (Adobe Shockwave Player APSB11-01 Multiple Remote Vulnerabilities) but has been given its own record to better document it.
Affected Products
Adobe shockwave_player
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Adobe
9.3