ID CVE-2009-4003
Summary Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption.
References
Vulnerable Configurations
  • cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:11:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 10-10-2018 - 19:48)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
oval via4
accepted 2014-11-10T04:02:37.829-05:00
class vulnerability
contributors
  • name J. Daniel Brown
    organization DTCC
  • name Maria Mikhno
    organization ALTX-SOFT
definition_extensions
comment Adobe Shockwave Player is installed
oval oval:org.mitre.oval:def:5990
description Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606 allow remote attackers to execute arbitrary code via (1) an unspecified block type in a Shockwave file, leading to a heap-based buffer overflow; and might allow remote attackers to execute arbitrary code via (2) an unspecified 3D block in a Shockwave file, leading to memory corruption; or (3) a crafted 3D model in a Shockwave file, leading to heap memory corruption.
family windows
id oval:org.mitre.oval:def:8538
status accepted
submitted 2010-01-20T17:00:00.000-05:00
title Adobe Shockwave Player Integer Overflow Vulnerability
version 4
refmap via4
bid 37872
bugtraq
  • 20100120 Secunia Research: Adobe Shockwave Player 3D Model Two Integer Overflows
  • 20100120 Secunia Research: Adobe Shockwave Player Four Integer Overflow Vulnerabilities
  • 20100120 Secunia Research: Adobe Shockwave Player Integer Overflow Vulnerability
confirm http://www.adobe.com/support/security/bulletins/apsb10-03.html
misc
sectrack 1023481
secunia 37888
vupen ADV-2010-0171
xf shockwave-shockwave-bo(55759)
Last major update 10-10-2018 - 19:48
Published 21-01-2010 - 19:30
Last modified 10-10-2018 - 19:48
Back to Top