Adobe has issued a security update after a vulnerability was revealed in its Shockwave player.
Following detection by Secunia, Adobe confirmed that critical vulnerabilities have been identified in Adobe Shockwave Player 11.5.2.602 and earlier versions, on the Windows and Macintosh operating systems.
Adobe said: “The vulnerabilities could allow an attacker, who successfully exploits the vulnerabilities, to run malicious code on the affected system. Adobe has provided a solution for the reported vulnerabilities. It is recommended that users update their installations to the latest version.”
The Common Vulnerabilities and Exposures (CVE) project assigned the code CVE-2009-4003 for the vulnerability. Secunia said that the vulnerability can be "exploited by malicious people to potentially compromise a user's system".
It is caused due to an integer overflow error when processing a certain Shockwave 3D block. This can be exploited to corrupt memory via a specially crafted Shockwave file. Successful exploitation may allow execution of arbitrary code.
US-CERT encouraged users and administrators to review Adobe Security Bulletin APSB10-03 and apply any necessary updates to help mitigate the risks.
See original article on scmagazineuk.com
Adobe issues update to critical vulnerability in Shockwave player
Flaw could allow malicious code to be run.
Got a news tip for our journalists? Share it with us anonymously here.
Sponsored Whitepapers
5 reasons to adopt a mobile first security strategy
Uncomplicate IT Service Delivery with AI Agents
Getting ahead of the tech: what’s next for Australian organisations in digital transformation
Fintech compliance made fast and secure
How to evaluate SIEM solutions Safeguarding your future Get a demo Download guide
iTnews Cloud Covered Breakfast Summit
Huntress _declassified Virtual Event
Live & Hands On Demo: Navigating the BMC AMI DevX Platform to Understand Code Faster Using AI
Melbourne Cloud & Datacenter Convention 2026
iTnews Executive Retreat - Data & AI Edition



