Fortinet Discovers Adobe Shockwave Player Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Adobe Shockwave Player.
Adobe Shockwave is a multimedia platform for building interactive multimedia applications and video games. The content is developed with Adobe Director and published on the Internet. Such content can be viewed in a web browser on any computer with the Shockwave Player plug-in installed. Shockwave supports raster graphics, basic vector graphics, 3D graphics, audio, and an embedded scripting language called Lingo. According to Adobe, over 450 million Internet-enabled computers have Adobe Shockwave Player installed.
A memory corruption vulnerability has been discovered in Shockwave. This vulnerability is caused due to insufficient validation on the data inside 'rcsL' atom. It could allow an attacker to execute arbitrary code on affected system via a crafted DIR file.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Jun 22, 2016
Users should apply the solution provided by Adobe.
Fortinet reported the vulnerability to Adobe on June 2, 2016.
Adobe confirmed the vulnerability on June 22, 2016.
Adobe patched the vulnerability on June 13, 2017.
This vulnerability was discovered by Honggang Ren of Fortinet's FortiGuard Labs.