Adobe plugs critical holes in Shockwave Player

Summary:These vulnerabilities could allow an attacker to run malicious code on an affected Windows or Mac OS X system.

Adobe has shipped an urgent Shockwave Player update to fix at least nine "critical" vulnerabilities that expose Windows and Mac users to computer-takeover attacks.

According to an advisory from Adobe, the flaws affect Adobe Shockwave Player 11.6.3.633 and earlier versions on the Windows and Macintosh operating systems.

"These vulnerabilities could allow an attacker, who successfully exploits these vulnerabilities, to run malicious code on the affected system. Adobe recommends users of Adobe Shockwave Player 11.6.3.633 and earlier versions update to Adobe Shockwave Player 11.6.4.634," the company said.

[ SEE: Ten little things to secure your online presence ]

Here's the skinny on the patched vulnerabilities:
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0757).
  • This update resolves a heap overflow vulnerability that could lead to code execution (CVE-2012-0758).
  • This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2012-0759).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0760).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0761).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0762).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0763).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0764).
  • This update resolves a memory corruption vulnerability in the Shockwave 3D Asset that could lead to code execution (CVE-2012-0766).

Separately, Adobe fixed an "important" vulnerability in RoboHelp 9 (or 8) for Word on Windows. "A specially crafted URL could be used to create a cross-site scripting attack on Web-based output generated using RoboHelp for Word," the company warned.

Topics: Banking, CXO, Enterprise Software

About

Ryan Naraine is a journalist and social media enthusiast specializing in Internet and computer security issues. He is currently security evangelist at Kaspersky Lab, an anti-malware company with operations around the globe. He is taking a leadership role in developing the company's online community initiative around secure content managem... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.