Adobe patches two critical vulnerabilities in Shockwave Player

The flaws could allow attackers to execute malicious code on computers remotely

Adobe Systems released a security update for Shockwave Player in order to address two vulnerabilities that could allow attackers to remotely take control of affected systems.

The new Shockwave Player version released Tuesday is 12.0.9.149 and is available for Windows and Mac.

The update fixes two memory corruption vulnerabilities identified as CVE-2014-0500 and CVE-2014-0501 that could lead to code execution, Adobe said in a security advisory. The vulnerabilities were reported to the company by researcher Liangliang Song of Fortinet's FortiGuard Labs.

The Shockwave Player update comes one week after Adobe broke out of its regular patching cycle to release an emergency update for Flash Player that addressed an actively exploited vulnerability. Unlike the Flash Player flaw, there are no reports that the Shockwave Player vulnerabilities are being exploited in attacks.

Shockwave Player is needed to display online content like games, product demonstrations, e-learning courses and simulations created with Adobe's Director software. It's not as widespread as Flash Player, but it is deployed on over 450 million desktop computers according to Adobe, which makes it a potential target for hackers.

Shockwave Player installs a plug-in in Web browsers which means it can be attacked with drive-by download exploits loaded from maliciously crafted or infected websites.

Tags: patches, online safety, Adobe Systems, security, patch management, Exploits / vulnerabilities

Microsoft confirms HTTP Strict Transport Security for IE 12

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Trend Micro Data Loss Prevention

Comprehensive Data Loss Prevention Lowers Cost and Complexity

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.