Vulnerabilities > CVE-2013-1386 - Memory Corruption vulnerability in Adobe Shockwave Player
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Adobe Shockwave Player before 12.0.2.122 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-1384.
Vulnerable Configurations
Nessus
NASL family Windows NASL id SHOCKWAVE_PLAYER_APSB13-12.NASL description The remote Windows host contains a version of Adobe last seen 2020-06-01 modified 2020-06-02 plugin id 65913 published 2013-04-10 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/65913 title Shockwave Player <= 12.0.0.112 Multiple Vulnerabilities (APSB13-12) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(65913); script_version("1.5"); script_cvs_date("Date: 2019/11/27"); script_cve_id( "CVE-2013-1383", "CVE-2013-1384", "CVE-2013-1385", "CVE-2013-1386" ); script_bugtraq_id( 58980, 58982, 58983, 58984 ); script_name(english:"Shockwave Player <= 12.0.0.112 Multiple Vulnerabilities (APSB13-12)"); script_summary(english:"Checks version of Shockwave Player"); script_set_attribute(attribute:"synopsis", value: "The remote Windows host contains a web browser plugin that is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The remote Windows host contains a version of Adobe's Shockwave Player that is equal to or earlier than 12.0.0.112. It is, therefore, potentially affected by the following vulnerabilities : - An unspecified buffer overflow exists. (CVE-2013-1383) - Two unspecified memory corruption errors exist. (CVE-2013-1384, CVE-2013-1386) - A memory leak error exists that weakens address space randomization. (CVE-2013-1385) A remote attacker could exploit these issues by tricking a user into viewing a malicious Shockwave file, resulting in arbitrary code execution."); script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb13-12.html"); script_set_attribute(attribute:"solution", value: "Upgrade to Adobe Shockwave Player 12.0.2.122 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-1386"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2013/04/09"); script_set_attribute(attribute:"patch_publication_date", value:"2013/04/09"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/04/10"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:shockwave_player"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("shockwave_player_apsb09_08.nasl"); script_require_keys("SMB/shockwave_player"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); installs = get_kb_list_or_exit("SMB/shockwave_player/*/path"); appname = "Shockwave Player"; latest_vuln_version = "12.0.0.112"; # versions <= this version are vuln fix = "12.0.2.122"; info = NULL; pattern = "SMB/shockwave_player/([^/]+)/([^/]+)/path"; vuln = 0; foreach install (keys(installs)) { match = eregmatch(string:install, pattern:pattern); if (!match) exit(1, "Unexpected format of KB key '" + install + "'."); file = installs[install]; variant = match[1]; version = match[2]; if (ver_compare(ver:version, fix:latest_vuln_version) <= 0) { if (variant == "Plugin") info += '\n Variant : Browser Plugin (for Firefox / Netscape / Opera)'; else if (variant == "ActiveX") info += '\n Variant : ActiveX control (for Internet Explorer)'; info += '\n File : ' + file + '\n Installed version : ' + version + '\n Fixed version : ' + fix + '\n'; vuln++; } } if (!info) audit(AUDIT_INST_VER_NOT_VULN, appname); port = get_kb_item("SMB/transport"); if (!port) port = 445; if (report_verbosity > 0) { if (vuln > 1) s = "s"; else s = ""; report = '\nNessus has identified the following vulnerable instance' + s + ' of Shockwave'+ '\nPlayer installed on the remote host :' + '\n' + info + '\n'; security_hole(port:port, extra:report); } else security_hole(port);
NASL family MacOS X Local Security Checks NASL id MACOSX_SHOCKWAVE_PLAYER_APSB13-12.NASL description The remote Mac OS X host contains a version of Adobe Shockwave Player that is equal to or prior than 12.0.0.112. It is, therefore, affected by the following vulnerabilities : - An unspecified buffer overflow exists. (CVE-2013-1383) - Two unspecified memory corruption errors exist. (CVE-2013-1384, CVE-2013-1386) - A memory leak error exists that weakens address space randomization. (CVE-2013-1385) A remote attacker can exploit these issues by tricking a user into viewing a malicious Shockwave file, resulting in arbitrary code execution. last seen 2020-06-01 modified 2020-06-02 plugin id 80184 published 2014-12-22 reporter This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/80184 title Adobe Shockwave Player <= 12.0.0.112 Multiple Vulnerabilities (APSB13-12) (Mac OS X) NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_15236023A21B11E2A460208984377B34.NASL description Adobe reports : These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system. last seen 2020-06-01 modified 2020-06-02 plugin id 65936 published 2013-04-12 reporter This script is Copyright (C) 2013-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/65936 title FreeBSD : linux-flashplugin -- multiple vulnerabilities (15236023-a21b-11e2-a460-208984377b34)