This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote Mac OS X host contains a web browser plugin that is
affected by multiple vulnerabilities.
The remote Mac OS X host contains a version of Adobe Shockwave Player
that is 22.214.171.1243 or earlier. It is, therefore, affected by multiple
code execution vulnerabilities.
- Multiple memory corruption issues exist related to the
Shockwave 3D Asset that allow code execution.
(CVE-2012-0757, CVE-2012-0760, CVE-2012-0761,
CVE-2012-0762, CVE-2012-0763, CVE-2012-0764,
- An unspecified heap-based buffer overflow exists that
allows code execution. (CVE-2012-0758)
- An unspecified memory corruption vulnerability exists
that allows to code execution. (CVE-2012-0759)
A remote attacker can exploit these issues by tricking a user into
viewing a malicious Shockwave file, resulting in arbitrary code
See also :
Upgrade to Adobe Shockwave 126.96.36.1994 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Family: MacOS X Local Security Checks
Nessus Plugin ID: 80179 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now