The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Adobe Shockwave Player: multiple vulnerabilities

Synthesis of the vulnerability 

An attacker can use several vulnerabilities of Adobe Shockwave Player.
Impacted systems: Shockwave Player.
Severity of this alert: 4/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 11/02/2014.
Références of this alert: APSB14-06, BID-65490, BID-65493, CERTFR-2014-AVI-067, CVE-2014-0500, CVE-2014-0501, VIGILANCE-VUL-14225.

Description of the vulnerability 

Several vulnerabilities were announced in Adobe Shockwave Player.

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; BID-65490, CVE-2014-0500]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; BID-65493, CVE-2014-0501]
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity alert impacts software or systems such as Shockwave Player.

Our Vigil@nce team determined that the severity of this weakness is critical.

The trust level is of type confirmed by the editor, with an origin of document.

This bulletin is about 2 vulnerabilities.

An attacker with a expert ability can exploit this security weakness.

Solutions for this threat 

Adobe Shockwave Player: version 12.0.9.149.
The version 12.0.9.149 is fixed:
  http://get.adobe.com/shockwave/
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides system vulnerability analysis. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.