iDefense Security Advisory 08.24.10 - Remote exploitation of a memory corruption vulnerability in Adobe Systems Inc.'s Shockwave Player could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability takes place during the processing of a tSAC chunk within an Adobe Director file. A length value is read from the tSAC chunk and a signed comparison is made against the length value. If the length value is negative, a memory address is incorrectly calculated and a null byte is written to the memory address. This condition may lead to arbitrary code execution. Shockwave Player 11.5.7.609 and earlier versions for Windows and Macintosh are vulnerable.
68619a8eca45b3da55b2ec6287b43f100bee34d1ebc1c0db29a67939107c0d1d