CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
June 25th, 2009

Critical Adobe Shockwave Player Vulnerability Affects Millions

Adobe’s Shockwave Player contains a critical vulnerability that could be exploited by remote hackers to take complete control of Windows computers, according to a warning from the software maker. According to Adobe, 450 million Internet-enabled desktops have installed Adobe Shockwave Player.

This issue is remotely exploitable and affects Adobe Shockwave Player 11.5.0.596 and earlier versions. According to Adobe’s advisory, this vulnerability could allow an attacker who successfully exploits this vulnerability to take control of the affected system. Adobe has provided a solution for the reported vulnerability (CVE-2009-1860). This issue was previously resolved in Shockwave Player 11.0.0.465; the Shockwave Player 11.5.0.600 update resolves a backwards compatibility mode variation of the issue with Shockwave Player 10 content.

To resolve this issue, Shockwave Player users on Windows should uninstall Shockwave version 11.5.0.596 and earlier on their systems, restart, and install Shockwave version 11.5.0.600, available at http://get.adobe.com/shockwave/.

Credit: ZDNet.com Security BLogs

Share this item with others:

More on CyberInsecure:
  • Critical Flash Player, Acrobat, Reader Vulnerability Exploited In The Wild
  • Adobe Fixes Clickjacking Vulnerability In Flash Player 10
  • Critical Security Vulnerability Patched In Adobe AIR 1.5
  • Microsoft, Adobe, Apple Fix Critical Security Vulnerabilities
  • Highly Critical Vulnerabilities Fixed In Urgent RealPlayer Update

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: Critical Adobe Shockwave Player Vulnerability Affects Millions

    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.