VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
VRDA-100125-001
Adobe Shockwave Player における複数の脆弱性
http://www.adobe.com/support/security/bulletins/apsb10-03.html

Critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.2.602 and earlier versions, on the Windows and Macintosh operating systems. The vulnerabilities could allow an attacker, who successfully exploits the vulnerabilities, to run malicious code on the affected system. Adobe has provided a solution for the reported vulnerabilities. It is recommended that users update their installations to the latest version using the instructions provided below.




この情報について
分析情報提供元:
JPCERT/CC
初版公開日:
2010-01-25
分析対象脆弱性情報の分類:
アドバイザリ・注意喚起
最終更新日:
2010-01-25




脆弱性の影響を受ける製品の識別子
cpe:/a:adobe:shockwave_player     (Adobe Macromedia Shockwave Player)
 


脆弱性の分析内容
[分析に利用した情報の信頼性] [?]
 [?]

 [?]
X [?]

[影響の大きさ] [?]
 [?]

小~中 [?]
中~大 [?]
X [?]

[攻撃経路] [?]
物理アクセス [?]

ローカルマシン上 [?]
同一セグメント上 [?]
X インターネット経由 [?]

[認証レベル] [?]
管理者アカウント [?]

一般ユーザアカウント [?]
フリーアカウント [?]
X 不要 [?]

[攻撃成立に必要なユーザの関与] [?]
複雑 [?]

X 簡単 [?]
不要 [?]

[攻撃の難易度] [?]
 [?]

中~高 [?]
低~中 [?]
 [?]

[対策の有無] [?]
X 公式パッチ有り [?]

公式回避策有り [?]
非公式回避策・パッチ有り [?]
なし [?]

[インシデントの発生状況] [?]
X 活動なし [?]

Exploit/PoCあり [?]
活動あり [?]

関連情報




参考情報
Common Vulnerabilities and Exposures (CVE) CVE-2009-4003
Multiple integer overflows in Adobe Shockwave Player before 11.5.6.606allow remote attackers to execute arbitrary code via (1) anunspecified block type in a Shockwave file, leading to a heap-basedbuffer overflow; and might allow remote attackers to execute arbitrarycode via (2) an unspecified 3D block in a Shockwave file, leading tomemory corruption; or (3) a crafted 3D model in a Shockwave file,leading to heap memory corruption.




Common Vulnerabilities and Exposures (CVE) CVE-2009-4002
Heap-based buffer overflow in Adobe Shockwave Player before 11.5.6.606allows remote attackers to execute arbitrary code via a crafted 3Dmodel in a Shockwave file.





Copyright © 2010 JPCERT/CC All Rights Reserved.