Vulnerabilities > CVE-2010-1282 - Infinite Loop vulnerability in Adobe Shockwave Player

047910
CVSS 6.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
adobe
CWE-835
nessus

Summary

Adobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file.

Nessus

  • NASL familyWindows
    NASL idSHOCKWAVE_PLAYER_APSB10-12.NASL
    descriptionThe remote Windows host contains a version of Adobe
    last seen2020-06-01
    modified2020-06-02
    plugin id46329
    published2010-05-12
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/46329
    titleShockwave Player < 11.5.7.609 Multiple Vulnerabilities (APSB10-12)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(46329);
      script_version("1.13");
      script_cvs_date("Date: 2018/11/15 20:50:28");
    
      script_cve_id(
        "CVE-2010-0127",
        "CVE-2010-0128",
        "CVE-2010-0129",
        "CVE-2010-0130",
        "CVE-2010-0986",
        "CVE-2010-0987",
        "CVE-2010-1280",
        "CVE-2010-1281",
        "CVE-2010-1282",
        "CVE-2010-1283",
        "CVE-2010-1284",
        "CVE-2010-1286",
        "CVE-2010-1287",
        "CVE-2010-1288",
        "CVE-2010-1289",
        "CVE-2010-1290",
        "CVE-2010-1291",
        "CVE-2010-1292"
      );
      script_bugtraq_id(
        40076,
        40077,
        40078,
        40079,
        40081,
        40082,
        40083,
        40084,
        40085,
        40086,
        40087,
        40088,
        40089,
        40090,
        40091,
        40093,
        40094,
        40096
      );
      script_xref(name:"Secunia", value:"38751");
    
      script_name(english:"Shockwave Player < 11.5.7.609 Multiple Vulnerabilities (APSB10-12)");
      script_summary(english:"Checks version of Shockwave Player");
    
      script_set_attribute(
        attribute:"synopsis",
        value:
    "The remote Windows host contains a web browser plugin that is
    affected by multiple vulnerabilities."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "The remote Windows host contains a version of Adobe's Shockwave Player
    that is earlier than 11.5.7.609.  Such versions are affected by the
    following issues :
    
      - Processing specially crafted FFFFFF45h Shockwave
        3D blocks can result in memory corruption.
        (CVE-2010-0127, CVE-2010-1283)
    
      - A signedness error that can lead to memory corruption
        when processing specially crafted Director files.
        (CVE-2010-0128)
    
      - An array indexing error that can lead to memory
        corruption when processing specially crafted
        Director files. (CVE-2010-0129)
    
      - An integer overflow vulnerability that can lead to
        memory corruption when processing specially
        crafted Director files. (CVE-2010-0130)
    
      - An unspecified error when processing asset entries
        in Director files can lead to memory corruption.
        (CVE-2010-0986)
    
      - A boundary error when processing embedded fonts
        from a Directory file can lead to memory corruption.
        (CVE-2010-0987)
    
      - An unspecified error when processing Director files
        can result in memory corruption. (CVE-2010-1280)
    
      - Several unspecified memory corruption vulnerabilities.
        (CVE-2010-1281, CVE-2010-1282, CVE-2010-1284,
        CVE-2010-1286, CVE-2010-1287, CVE-2010-1288,
        CVE-2010-1289, CVE-2010-1290, CVE-2010-1291,
        CVE-2010-1292)"
      );
      script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2010-17/");
      script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2010-19/");
      script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2010-20/");
      script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2010-22/");
      script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2010-34/");
      script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2010-50/");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-10-087/");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-10-088/");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-10-089/");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?19865c37");
      script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2010/May/136");
      script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2010/May/137");
      script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2010/May/138");
      script_set_attribute(attribute:"see_also", value:"http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php");
      script_set_attribute(attribute:"see_also", value:"http://www.coresecurity.com/content/adobe-director-invalid-read");
      script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb10-12.html");
      script_set_attribute(
        attribute:"solution",
        value:"Upgrade to Adobe Shockwave 11.5.7.609 or later."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2010/05/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2010/05/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/05/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:shockwave_player");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
    
      script_dependencies("shockwave_player_apsb09_08.nasl");
      script_require_keys("SMB/shockwave_player");
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("smb_func.inc");
    
    
    port = kb_smb_transport();
    installs = get_kb_list('SMB/shockwave_player/*/path');
    if (isnull(installs))
      exit(0, 'Shockwave Player was not detected on the remote host.');
    
    info = NULL;
    pattern = 'SMB/shockwave_player/([^/]+)/([^/]+)/path';
    
    foreach install (keys(installs))
    {
      match = eregmatch(string:install, pattern:pattern);
      if (!match) exit(1, 'Unexpected format of KB key "'+install+'".');
    
      file = installs[install];
      variant = match[1];
      version = match[2];
      ver = split(version, sep:'.', keep:FALSE);
      for (i = 0; i < max_index(ver); i++)
         ver[i] = int(ver[i]);
    
      if (
        ver[0] < 11 ||
        (
          ver[0] == 11 &&
          (
            ver[1] < 5 ||
            (
              ver[1] == 5 &&
              (
                ver[2] < 7 ||
                (ver[2] == 7 && ver[3] < 609)
              )
            )
          )
        )
      )
      {
        if (variant == "Plugin")
        {
          info += '\n  - Browser Plugin (for Firefox / Netscape / Opera) :\n';
        }
        else if (variant == "ActiveX")
        {
          info += '\n  - ActiveX control (for Internet Explorer) :\n';
        }
        info += '    ' + file + ', ' + version + '\n';
      }
    }
    
    if (!info) exit(0, "No vulnerable installs of Shockwave Player were found.");
    
    if (report_verbosity > 0)
    {
      if (max_index(split(info)) > 2) s = "s";
      else s = "";
    
      report =
        '\nNessus has identified the following vulnerable instance'+s+' of Shockwave'+
        '\nPlayer installed on the remote host :\n'+
        info;
      security_hole(port:port, extra:report);
    }
    else security_hole(port:port);
    
    
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SHOCKWAVE_PLAYER_APSB10-12.NASL
    descriptionThe remote Mac OS X host contains a version of Adobe Shockwave Player that is 11.5.6.606 or earlier. It is, therefore, affected by multiple vulnerabilities : - Processing specially crafted FFFFFF45h Shockwave 3D blocks results in memory corruption. (CVE-2010-0127, CVE-2010-1283) - A signedness error leads to memory corruption when processing specially crafted Director files. (CVE-2010-0128) - An array indexing error leads to memory corruption when processing specially crafted Director files. (CVE-2010-0129) - An integer overflow vulnerability leads to memory corruption when processing specially crafted Director files. (CVE-2010-0130) - An unspecified error when processing asset entries in Director files leads to memory corruption. (CVE-2010-0986) - A boundary error when processing embedded fonts from a Directory file leads to memory corruption. (CVE-2010-0987) - An unspecified error when processing Director files results in memory corruption. (CVE-2010-1280) - Several unspecified memory corruption vulnerabilities. (CVE-2010-1281, CVE-2010-1282, CVE-2010-1284, CVE-2010-1286, CVE-2010-1287, CVE-2010-1288, CVE-2010-1289, CVE-2010-1290, CVE-2010-1291, CVE-2010-1292)
    last seen2020-06-01
    modified2020-06-02
    plugin id80172
    published2014-12-22
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80172
    titleAdobe Shockwave Player <= 11.5.6.606 Multiple Vulnerabilities (APSB10-12) (Mac OS X)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(80172);
      script_version("1.4");
      script_cvs_date("Date: 2018/07/14  1:59:35");
    
      script_cve_id(
        "CVE-2010-0127",
        "CVE-2010-0128",
        "CVE-2010-0129",
        "CVE-2010-0130",
        "CVE-2010-0986",
        "CVE-2010-0987",
        "CVE-2010-1280",
        "CVE-2010-1281",
        "CVE-2010-1282",
        "CVE-2010-1283",
        "CVE-2010-1284",
        "CVE-2010-1286",
        "CVE-2010-1287",
        "CVE-2010-1288",
        "CVE-2010-1289",
        "CVE-2010-1290",
        "CVE-2010-1291",
        "CVE-2010-1292"
      );
      script_bugtraq_id(
        40076,
        40077,
        40078,
        40079,
        40081,
        40082,
        40083,
        40084,
        40085,
        40086,
        40087,
        40088,
        40089,
        40090,
        40091,
        40093,
        40094,
        40096
      );
    
      script_name(english:"Adobe Shockwave Player <= 11.5.6.606 Multiple Vulnerabilities (APSB10-12) (Mac OS X)");
      script_summary(english:"Checks the version of Shockwave Player.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Mac OS X host contains a web browser plugin that is
    affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The remote Mac OS X host contains a version of Adobe Shockwave Player
    that is 11.5.6.606 or earlier. It is, therefore, affected by multiple
    vulnerabilities :
    
      - Processing specially crafted FFFFFF45h Shockwave
        3D blocks results in memory corruption. (CVE-2010-0127,
        CVE-2010-1283)
    
      - A signedness error leads to memory corruption when
        processing specially crafted Director files.
        (CVE-2010-0128)
    
      - An array indexing error leads to memory corruption when
        processing specially crafted Director files.
        (CVE-2010-0129)
    
      - An integer overflow vulnerability leads to memory
        corruption when processing specially crafted Director
        files. (CVE-2010-0130)
    
      - An unspecified error when processing asset entries
        in Director files leads to memory corruption.
        (CVE-2010-0986)
    
      - A boundary error when processing embedded fonts from a
        Directory file leads to memory corruption.
        (CVE-2010-0987)
    
      - An unspecified error when processing Director files
        results in memory corruption. (CVE-2010-1280)
    
      - Several unspecified memory corruption vulnerabilities.
        (CVE-2010-1281, CVE-2010-1282, CVE-2010-1284,
        CVE-2010-1286, CVE-2010-1287, CVE-2010-1288,
        CVE-2010-1289, CVE-2010-1290, CVE-2010-1291,
        CVE-2010-1292)");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-10-087/");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-10-088/");
      script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-10-089/");
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?19865c37");
      script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2010/May/130");
      script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2010/May/131");
      script_set_attribute(attribute:"see_also", value:"http://seclists.org/fulldisclosure/2010/May/132");
      script_set_attribute(attribute:"see_also", value:"http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4937.php");
      script_set_attribute(attribute:"see_also", value:"http://www.coresecurity.com/content/adobe-director-invalid-read");
      script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb10-12.html");
      script_set_attribute(attribute:"solution", value:"Upgrade to Adobe Shockwave 11.5.7.609 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2010/05/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2010/05/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/22");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:shockwave_player");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2014-2018 Tenable Network Security, Inc.");
    
      script_dependencies("shockwave_player_detect_macosx.nbin");
      script_require_keys("installed_sw/Shockwave Player", "Host/MacOSX/Version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    os = get_kb_item("Host/MacOSX/Version");
    if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
    
    app = 'Shockwave Player';
    
    get_install_count(app_name:app, exit_if_zero:TRUE);
    
    install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
    
    ver = install['version'];
    path = install['path'];
    
    if (ver_compare(ver:ver, fix:'11.5.6.606', strict:FALSE) <= 0)
    {
      if (report_verbosity > 0)
      {
        report =
          '\n  Path              : ' + path +
          '\n  Installed version : ' + ver +
          '\n  Fixed versions    : 11.5.7.609' +
          '\n';
        security_hole(port:0, extra:report);
      }
      else security_hole(port:0);
    }
    else audit(AUDIT_INST_PATH_NOT_VULN, app, ver, path);
    

Oval

accepted2014-11-10T04:02:35.337-05:00
classvulnerability
contributors
  • nameJ. Daniel Brown
    organizationDTCC
  • nameMaria Mikhno
    organizationALTX-SOFT
definition_extensions
commentAdobe Shockwave Player is installed
ovaloval:org.mitre.oval:def:5990
descriptionAdobe Shockwave Player before 11.5.7.609 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted ATOM size in a .dir (aka Director) file.
familywindows
idoval:org.mitre.oval:def:7388
statusaccepted
submitted2010-05-12T17:30:00.000-05:00
titleAdobe Shockwave Player Infinite Loop Vulnerability
version6

Seebug

bulletinFamilyexploit
descriptionCVE ID: CVE-2010-1282 Code Audit Labs http://www.vulnhunt.com 在Adobe’s Shockwave Player软件中 发现一个漏洞,触发该漏洞需要用户访问一个畸形的web页面。 该漏洞存在于当shockwave player分析atom size时,不当处理导致代码无限循环。 成功利用能导致cpu 100%,造成拒绝服务攻击。 11.5.2.602 ,11.5.6.606 and prior 厂商补丁: adobe --------- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本: http://www.adobe.com
idSSV:19587
last seen2017-11-19
modified2010-05-12
published2010-05-12
reporterRoot
titleAdobe Shockwave Player Director文件分析ATOM size无限循环漏洞