[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194770 Download | Alert*

An unspecified function in TextXtra.x32 in Adobe Shockwave Player before 11.5.9.615 does not properly reallocate a buffer when processing a DEMX chunk in a Director file, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly reallocate a buffer when processing a DEMX chunk in a Director file. Successful exploitation allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code.

The host is missing a critical security update according to APSA10-04. The update is required to fix denial of service vulnerability. A flaw is present in the application, which fails to properly handle a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information.

The host is missing a critical security update according to APSA10-04. The update is required to fix denial of service vulnerability. A flaw is present in the application, which fails to properly handle a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset. Successful exploitation allows remote attackers to execute arbitrary code.

The host is installed with Adobe Shockwave Player before 11.5.9.615 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to handle a Director file containing a crafted pamm chunk with an invalid size and number of sub-chunks. Successful exploitation allows remote attackers to execute arbitrary code or cause a denial of service.

dirapi.dll in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director file containing a crafted pamm chunk with an invalid (1) size and (2) number of sub-chunks, a different vulnerability than CVE-2010-4084, CVE-2010-4085, CVE-2010-4086, and CVE-2010-4088.

The host is missing a critical security update according to Adobe advisory, APSB11-03. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to properly handle crafted data. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Adobe Reader 9.x through 9.4.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted PDF document that triggers memory corruption. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    8361    8362    8363    8364    8365    8366    8367    8368    8369    8370    8371    8372    8373    8374    ..   19476

© SecPod Technologies