Vulnerability Name:

CVE-2010-1281 (CCN-58448)

Assigned:2010-05-11
Published:2010-05-11
Updated:2022-09-29
Summary:iml32.dll in Adobe Shockwave Player before 11.5.7.609 does not validate a certain value from a file before using it in file-pointer calculations, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .dir (aka Director) file.
CVSS v3 Severity:8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-1281

Source: CCN
Type: SA38751
Adobe Shockwave Player Multiple Vulnerabilities

Source: SECUNIA
Type: Broken Link, Vendor Advisory
38751

Source: CCN
Type: Adobe Product Security Bulletin APSB10-12
Security update available for Shockwave Player

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb10-12.html

Source: CCN
Type: OSVDB ID: 64647
Adobe Shockwave Player iml32.dll Crafted DIR File File-pointer Calculation Validation Weakness Memory Corruption

Source: BUGTRAQ
Type: Broken Link, VDB Entry
20100511 ZDI-10-087: Adobe Shockwave Invalid Offset Memory Corruption Remote Code Execution Vulnerability

Source: CCN
Type: BID-40078
Adobe Shockwave Player Director File Parsing Invalid Offset Remote Code Execution Vulnerability

Source: VUPEN
Type: Broken Link, Vendor Advisory
ADV-2010-1128

Source: MISC
Type: Third Party Advisory, VDB Entry
http://www.zerodayinitiative.com/advisories/ZDI-10-087/

Source: XF
Type: UNKNOWN
shockwave-iml32-code-execution(58448)

Source: OVAL
Type: Broken Link, Tool Signature
oval:org.mitre.oval:def:7268

Source: CCN
Type: ZDI-10-087
Adobe Shockwave Invalid Offset Memory Corruption Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:adobe:shockwave_player:*:*:*:*:*:*:*:* (Version < 11.5.7.609)
  • AND
  • cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*
  • OR cpe:/o:apple:macos:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:7268
    V
    Adobe Shockwave Player Director File Parsing Invalid Offset Remote Code Execution Vulnerability
    2014-11-10
    BACK
    adobe shockwave player *
    microsoft windows *
    apple macos *
    adobe shockwave player 11.5.6.606