Fortinet Discovers Adobe Shockwave Player Memory Corruption Vulnerability II
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Adobe Shockwave Player.
Adobe Shockwave is a multimedia platform for building interactive multimedia applications and video games. The content is developed with Adobe Director and published on the Internet. Such content can be viewed in a web browser on any computer with the Shockwave Player plug-in installed. Shockwave supports raster graphics, basic vector graphics, 3D graphics, audio, and an embedded scripting language called Lingo. According to Adobe, over 450 million Internet-enabled computers have Adobe Shockwave Player installed.
A memory corruption vulnerability exists in Shockwave Player. This vulnerability is caused due to insufficient validation on the index value inside 'demx' atom. It may lead to an unexpected application termination or arbitrary code execution.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Jul 06, 2015
Users should apply the solution provided by Adobe.
This vulnerability was discovered by Honggang Ren of Fortinet's FortiGuard Labs.