Adobe plugs up buffer overflow holes in Shockwave update
Nobody using them yet - but they will be now
Adobe released a patch for its Shockwave Player software on Tuesday, addressing six security vulnerabilities that might easily lend themselves to malware-pushing exploits.
Shockwave Player 188.8.131.527 and earlier versions on both Windows and Mac need updating to the latest version: Shockwave Player 184.108.40.2068.
Adobe said it was not aware of any exploits in the wild, so there's no need for panic, but since vulnerabilities in Adobe software applications have become a major target for the bad guys over the last two or three years, dismissing the update as unimportant would be equally unwise.
Adobe credited security researchers at Fortinet's FortiGuard Labs and CERT for help in discovering the security bugs in its software. A security advisory from Adobe explains that the security bugs in Shockwave involve a mix of buffer overflow vulnerabilities as well as an "array out of bounds" security bug, all of which could result in code execution on systems running the vulnerable software. ®
is a bit like your gran cleaning your room, her bad back stops her cleaning under the bed and on top of the cupboards.
Re: Good Grief
I can only assume from the naivety of your post that Shockwave is older than you are, in which case it should be immediately apparent that its code probably is written in C.
Re: Shockwave - all 2 users will be pissed
"There's a lot of educational software written in Shockwave."
but norm its in an shockwave software cd's warped .exe so
Problem is no one ever updates it