Vulnerabilities > CVE-2010-2866 - Numeric Errors vulnerability in Adobe Shockwave Player
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Exploit-Db
description | MOAUB #22 - Adobe Shockwave Director tSAC Chunk Memory Corruption. CVE-2010-2866. Dos exploit for windows platform |
id | EDB-ID:15076 |
last seen | 2016-02-01 |
modified | 2010-09-22 |
published | 2010-09-22 |
reporter | Abysssec |
source | https://www.exploit-db.com/download/15076/ |
title | Adobe Shockwave Director tSAC - Chunk Memory Corruption |
Nessus
NASL family MacOS X Local Security Checks NASL id MACOSX_SHOCKWAVE_PLAYER_APSB10-20.NASL description The remote Mac OS X host contains a version of Adobe Shockwave Player that is 11.5.7.609 or earlier. It is, therefore, affected by multiple vulnerabilities : - Multiple memory corruption issues exist that allow arbitrary code execution. (CVE-2010-2863, CVE-2010-2864, CVE-2010-2866, CVE-2010-2869, CVE-2010-2870, CVE-2010-2871, CVE-2010-2872, CVE-2010-2873, CVE-2010-2873, CVE-2010-2874, CVE-2010-2875, CVE-2010-2876, CVE-2010-2877, CVE-2010-2878, CVE-2010-2880, CVE-2010-2881, CVE-2010-2882) - A pointer offset vulnerability exists that allows code execution. (CVE-2010-2867) - Multiple unspecified denial of service issues exist. (CVE-2010-2865, CVE-2010-2868) - An integer overflow vulnerability exists that allows to code execution. (CVE-2010-2879) last seen 2020-06-01 modified 2020-06-02 plugin id 80173 published 2014-12-22 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/80173 title Adobe Shockwave Player <= 11.5.7.609 (APSB10-20) (Mac OS X) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(80173); script_version("1.4"); script_cvs_date("Date: 2019/11/25"); script_cve_id( "CVE-2010-2863", "CVE-2010-2864", "CVE-2010-2865", "CVE-2010-2866", "CVE-2010-2867", "CVE-2010-2868", "CVE-2010-2869", "CVE-2010-2870", "CVE-2010-2871", "CVE-2010-2872", "CVE-2010-2873", "CVE-2010-2874", "CVE-2010-2875", "CVE-2010-2876", "CVE-2010-2877", "CVE-2010-2878", "CVE-2010-2879", "CVE-2010-2880", "CVE-2010-2881", "CVE-2010-2882" ); script_bugtraq_id( 42664, 42665, 42666, 42667, 42668, 42669, 42670, 42671, 42672, 42673, 42674, 42675, 42676, 42677, 42678, 42679, 42680, 42682, 42683, 42684 ); script_name(english:"Adobe Shockwave Player <= 11.5.7.609 (APSB10-20) (Mac OS X)"); script_summary(english:"Checks the version of Shockwave Player."); script_set_attribute(attribute:"synopsis", value: "The remote Mac OS X host contains a web browser plugin that is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The remote Mac OS X host contains a version of Adobe Shockwave Player that is 11.5.7.609 or earlier. It is, therefore, affected by multiple vulnerabilities : - Multiple memory corruption issues exist that allow arbitrary code execution. (CVE-2010-2863, CVE-2010-2864, CVE-2010-2866, CVE-2010-2869, CVE-2010-2870, CVE-2010-2871, CVE-2010-2872, CVE-2010-2873, CVE-2010-2873, CVE-2010-2874, CVE-2010-2875, CVE-2010-2876, CVE-2010-2877, CVE-2010-2878, CVE-2010-2880, CVE-2010-2881, CVE-2010-2882) - A pointer offset vulnerability exists that allows code execution. (CVE-2010-2867) - Multiple unspecified denial of service issues exist. (CVE-2010-2865, CVE-2010-2868) - An integer overflow vulnerability exists that allows to code execution. (CVE-2010-2879)"); script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb10-20.html"); script_set_attribute(attribute:"solution", value: "Upgrade to Adobe Shockwave 11.5.8.612 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2010-2863"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2010/08/24"); script_set_attribute(attribute:"patch_publication_date", value:"2010/08/24"); script_set_attribute(attribute:"plugin_publication_date", value:"2014/12/22"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:shockwave_player"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("shockwave_player_detect_macosx.nbin"); script_require_keys("installed_sw/Shockwave Player", "Host/MacOSX/Version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("install_func.inc"); os = get_kb_item("Host/MacOSX/Version"); if (!os) audit(AUDIT_OS_NOT, "Mac OS X"); app = 'Shockwave Player'; get_install_count(app_name:app, exit_if_zero:TRUE); install = get_single_install(app_name:app, exit_if_unknown_ver:TRUE); ver = install['version']; path = install['path']; if (ver_compare(ver:ver, fix:'11.5.7.609', strict:FALSE) <= 0) { if (report_verbosity > 0) { report = '\n Path : ' + path + '\n Installed version : ' + ver + '\n Fixed versions : 11.5.8.612' + '\n'; security_hole(port:0, extra:report); } else security_hole(port:0); } else audit(AUDIT_INST_PATH_NOT_VULN, app, ver, path);
NASL family Windows NASL id SHOCKWAVE_PLAYER_APSB10-20.NASL description The remote Windows host contains a version of Adobe last seen 2020-06-01 modified 2020-06-02 plugin id 48436 published 2010-08-25 reporter This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/48436 title Shockwave Player < 11.5.8.612
Oval
accepted | 2014-11-10T04:00:21.922-05:00 | ||||||||
class | vulnerability | ||||||||
contributors |
| ||||||||
definition_extensions |
| ||||||||
description | Integer signedness error in the DIRAPI module in Adobe Shockwave Player before 11.5.8.612 allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a count value associated with an "undocumented structure" and the tSAC chunk in a Director movie. | ||||||||
family | windows | ||||||||
id | oval:org.mitre.oval:def:11932 | ||||||||
status | accepted | ||||||||
submitted | 2010-08-25T17:30:00.000-05:00 | ||||||||
title | Adobe Shockwave Player Memory Corruption Vulnerability | ||||||||
version | 6 |
References
- http://dvlabs.tippingpoint.com/advisory/TPTI-10-13
- http://dvlabs.tippingpoint.com/advisory/TPTI-10-13
- http://www.adobe.com/support/security/bulletins/apsb10-20.html
- http://www.adobe.com/support/security/bulletins/apsb10-20.html
- http://www.securityfocus.com/archive/1/513301/100/0/threaded
- http://www.securityfocus.com/archive/1/513301/100/0/threaded
- http://www.securitytracker.com/id?1024361
- http://www.securitytracker.com/id?1024361
- http://www.vupen.com/english/advisories/2010/2176
- http://www.vupen.com/english/advisories/2010/2176
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11932