Shockwave Player Crafted Director File Handling Remote Code Execution (APSB09-08)

High Nessus Plugin ID 39564


The remote Windows host contains a browser plugin that is affected by a pointer overwrite vulnerability.


The remote Windows host contains a version of Adobe's Shockwave Player that is earlier than Such versions are reportedly affected by a vulnerability that can be triggered using a specially crafted Adobe Director File to overwrite a 4-byte memory location during a memory dereference. If an attacker can trick a user of the affected software into opening such a file, he can leverage this issue to execute arbitrary code with the privileges of that user.


Uninstall all instances of Shockwave Player version and earlier, restart the system, and then install version or later.

See Also

Plugin Details

Severity: High

ID: 39564

File Name: shockwave_player_apsb09_08.nasl

Version: $Revision: 1.16 $

Type: local

Agent: windows

Family: Windows

Published: 2009/06/28

Modified: 2015/01/12

Dependencies: 13855, 21746

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:adobe:shockwave_player

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2009-1860

BID: 35469

OSVDB: 55334