Adobe plugs critical holes in Shockwave Player

Adobe plugs critical holes in Shockwave Player

تاریخ ایجاد

ID :IRCNE2012021405
Date: 2012-02-15

According to ZDNet, Adobe has shipped an urgent Shockwave Player update to fix at least nine “critical” vulnerabilities that expose Windows and Mac users to computer-takeover attacks.
According to an advisory from Adobe, the flaws affect Adobe Shockwave Player 11.6.3.633 and earlier versions on the Windows and Macintosh operating systems.
“These vulnerabilities could allow an attacker, who successfully exploits these vulnerabilities, to run malicious code on the affected system. Adobe recommends users of Adobe Shockwave Player 11.6.3.633 and earlier versions update to Adobe Shockwave Player 11.6.4.634,” the company said.
Here’s the skinny on the patched vulnerabilities:

  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0757).
  • This update resolves a heap overflow vulnerability that could lead to code execution (CVE-2012-0758).
  • This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2012-0759).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0760).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0761).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0762).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0763).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0764).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0766).

Separately, Adobe fixed an “important” vulnerability in RoboHelp 9 (or 8) for Word on Windows. “A specially crafted URL could be used to create a cross-site scripting attack on Web-based output generated using RoboHelp for Word,” the company warned.

برچسب‌ها