![]() ![]() ![]() "We are reviewing our security update process in order to mitigate risks in Shockwave Player," Edell said. Content was developed with Adobe Director and published on the Internet. Because of this, it may be easier to exploit a vulnerability when Flash is hosted by Shockwave, for example."Īdobe spokeswoman Heather Edell confirmed that CERT's information is correct, and that the next release of Shockwave Player will include the updated version of Flash Player. Adobe Shockwave Player (formerly Macromedia Shockwave Player, and also known as Shockwave for Director) is a discontinued freeware software plug-in for viewing multimedia and video games created on the Adobe Shockwave platform in web pages. In the case of Shockwave, there are some mitigations missing in a number of modules, such as SafeSEH. "One of the things that helps make a vulnerability more difficult is how many of the exploit mitigations a vendor opts in to. "So not only are the vulnerabilities there, but they're easier to exploit as well," Dormann said. That's because Shockwave has several modules that don't opt in to trivial exploit mitigation techniques built into Microsoft Windows, such as SafeSEH. Dormann said he initially alerted the public to this gaping security hole in 2012 via this advisory, but that he first told Adobe about this lacklustre update process back in 2010.Īs if that weren't bad enough, Dormann said it may actually be easier for attackers to exploit Flash vulnerabilities via Shockwave than it is to exploit them directly against the stand-alone Flash plug-in itself. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |