Adobe Shockwave Player Memory Corruption Vulnerability 2

2010.09.01
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

I'm writing on behalf of the Check Point Vulnerability Discovery Team to publish the following vulnerability. Check Point Software Technologies - Vulnerability Discovery Team (VDT) http://www.checkpoint.com/defense/ Memory corruption when Adobe Shockwave Player parses .dir media file CVE-2010-2882 INTRODUCTION Adobe Shockwave Player is the Adobe plugin to many different browsers to view rich-media content on the web including animations, interactive presentations, and online entertainment. Adobe Shockwave player does not properly parse .dir media file, which causes a corruption in module DIRAPI.dll by opening a malformed file with an invalid value located in PoC repro.dir at offset 0x3812. This problem was confirmed in the following versions of Adobe Shockwave Player, other versions may be also affected. Shockwave Player version 11.5.7.609 and older for Windows and MacOS CVSS Scoring System The CVSS score is: 9 Base Score: 10 Temporal Score: 9 We used the following values to calculate the scores: Base score is: AV:N/AC:L/Au:N/C:C/I:C/A:C Temporal score is: E:POC/RL:U/RC:C TRIGGERING THE PROBLEM To trigger the problem a PoC file (repro11.dir) is available to interested parts. DETAILS Disassembly: 68113255 8B4C24 24 MOV ECX,DWORD PTR SS:[ESP+24] 68113259 8B01 MOV EAX,DWORD PTR DS:[ECX] 6811325B FF48 04 DEC DWORD PTR DS:[EAX+4] 6811325E 8B01 MOV EAX,DWORD PTR DS:[ECX] 68113260 8B48 04 MOV ECX,DWORD PTR DS:[EAX+4] 68113263 85C9 TEST ECX,ECX 68113265 ^0F8F 95EEFFFF JG DIRAPI.68112100 6811326B 8B5424 24 MOV EDX,DWORD PTR SS:[ESP+24] 6811326F 8B08 MOV ECX,DWORD PTR DS:[EAX] 68113271 52 PUSH EDX 68113272 56 PUSH ESI 68113273 FF51 0C CALL DWORD PTR DS:[ECX+C] <--- Problem ECX = 0x00000000 CREDITS This vulnerability was discovered and researched by Rodrigo Rubira Branco from Check Point Vulnerability Discovery Team (VDT). Best Regards, Rodrigo. -- Rodrigo Rubira Branco Senior Security Researcher Vulnerability Discovery Team (VDT) Check Point Software Technologies

References:

http://www.adobe.com/support/security/bulletins/apsb10-20.html
http://www.securityfocus.com/archive/1/archive/1/513339/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top