Shockwave Player Crafted Director File Handling Remote Code Execution (APSB09-08)

This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a browser plugin that is affected by
a pointer overwrite vulnerability.

Description :

The remote Windows host contains a version of Adobe's Shockwave Player
that is earlier than 11.5.0.600. Such versions are reportedly affected
by a vulnerability that can be triggered using a specially crafted
Adobe Director File to overwrite a 4-byte memory location during a
memory dereference. If an attacker can trick a user of the affected
software into opening such a file, he can leverage this issue to
execute arbitrary code with the privileges of that user.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-09-044/
http://www.adobe.com/support/security/bulletins/apsb09-08.html

Solution :

Uninstall all instances of Shockwave Player version 11.5.0.596 and
earlier, restart the system, and then install version 11.5.0.600 or
later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 39564 ()

Bugtraq ID: 35469

CVE ID: CVE-2009-1860

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now