Fortinet Discovers Adobe Shockwave Player rcsL Atom Handling Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Adobe Shockwave Player.
Adobe Shockwave is a multimedia platform for building interactive multimedia applications and video games. The content is developed with Adobe Director and published on the Internet. Such content can be viewed in a web browser on any computer with the Shockwave Player plug-in installed. Shockwave supports raster graphics, basic vector graphics, 3D graphics, audio, and an embedded scripting language called Lingo. According to Adobe, over 450 million Internet-enabled computers have Adobe Shockwave Player installed.
A memory corruption vulnerability has been discovered in Shockwave. This vulnerability is caused due to insufficient validation on the value of file offset inside 'rcsL' atom. It could potentially allow an attacker to take control of the affected system.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Oct 26, 2015
Users should apply the solution provided by Adobe.
This vulnerability was discovered by Honggang Ren of Fortinet's FortiGuard Labs.