Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Adobe Shockwave Vendors:   Adobe Systems Incorporated
Adobe Shockwave Player Has Multiple Buffer Overflows and Memory Corruption Errors That Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1025650
SecurityTracker URL:
CVE Reference:   CVE-2011-0317, CVE-2011-0318, CVE-2011-0319, CVE-2011-0320, CVE-2011-0335, CVE-2011-2108, CVE-2011-2109, CVE-2011-2111, CVE-2011-2112, CVE-2011-2113, CVE-2011-2114, CVE-2011-2115, CVE-2011-2116, CVE-2011-2117, CVE-2011-2118, CVE-2011-2119, CVE-2011-2120, CVE-2011-2121, CVE-2011-2122, CVE-2011-2123, CVE-2011-2124, CVE-2011-2125, CVE-2011-2126, CVE-2011-2127   (Links to External Site)
Date:  Jun 14 2011
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): and prior versions
Description:   Multiple vulnerabilities were reported in Adobe Shockwave. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a buffer overflow or memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Honggang Ren of Fortinet's Fortiguard Labs, Mark Yason of IBM X-Force Research, IBM Security Solutions, Carsten Eiram, Secunia Research, Aaron Portnoy and Logan Brown, TippingPoint DVLabs, Aniway (via TippingPoint's Zero Day Initiative), Luigi Auriemma (via iDefense Labs), Will Dormann of CERT, Luigi Auriemma (via TippingPoint's Zero Day Initiative), Sebastian Apelt (via TippingPoint's Zero Day Initiative), Binaryproof (via TippingPoint's Zero Day Initiative), Donato Ferrante (via TippingPoint's Zero Day Initiative), Rodrigo Rubira Branco - Qualys Vulnerability & Malware Research Team (VMRT), and Celil Unuver, SignalSEC and BGA, reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix (

The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error, Boundary error
Underlying OS:  UNIX (macOS/OS X), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC