Adobe fixes critical Shockwave Player vulnerability


by CBR Staff Writer| 12 February 2014

Memory corruption bugs enabled hackers to take on victims' PCs through remote code execution.

Adobe has fixed vulnerabilities in its Shockwave Player and earlier versions for Windows and Macintosh, which could be hit with attacks via memory corruption flaws.

Adobe said in a statement that the latest update addresses critical vulnerabilities that could potentially allow an attacker to remotely take control of the affected system.

"Adobe recommends users of Adobe Shockwave Player and earlier versions update to Adobe Shockwave Player," the software firm added.

The security bulletin noted that the memory corruption bugs including CVE-2014-0500 and CVE-2014-0501 would allow hackers to take on victims' systems through remote code execution.

The software firm noted that the vulnerabilities were first discovered by Liangliang Song of Fortinet's FortiGuard Labs and then worked collaboratively to help protect its users.

Earlier, security researchers at AV-Test Institute revealed that one of the vulnerabilities for Adobe Reader topped the list with nearly 37,000 different variants recorded.

However, the US software firm has been striving to boost its software development processes by reducing the overall vulnerabilities within the past five to ten years.

Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

716 people like this.
1551 people follow this.

Security Intelligence

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.