Shockwave Player Crafted Director File Handling Remote Code Execution (APSB09-08)

This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.

Synopsis :

The remote Windows host contains a browser plugin that is affected by
a pointer overwrite vulnerability.

Description :

The remote Windows host contains a version of Adobe's Shockwave Player
that is earlier than Such versions are reportedly affected
by a vulnerability that can be triggered using a specially crafted
Adobe Director File to overwrite a 4-byte memory location during a
memory dereference. If an attacker can trick a user of the affected
software into opening such a file, he can leverage this issue to
execute arbitrary code with the privileges of that user.

See also :

Solution :

Uninstall all instances of Shockwave Player version and
earlier, restart the system, and then install version or

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 39564 ()

Bugtraq ID: 35469

CVE ID: CVE-2009-1860

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now