Adobe Systems patched 20 security vulnerabilities in its Shockwave Player on Tuesday. Most of the flaws could allow an attacker to run their own code on an affected computer.
Eighteen of the problems could lead to code execution, while the remaining two are denial of service issues, one of which could possibly lead to remote code execution.
Shockwave Player is used to display content created by Adobe's Director program, which offers advanced tools for creating interactive content, including Flash. The Director application can be used for creating 3D models, high-quality images and full-screen or long-form digital content and offers greater control over how those elements are displayed.
The problems were discovered by various researchers, and Adobe credited Fortinet and Check Point, as well as anonymous researchers who contributed to TippingPoint's Zero Day Initiative and iDefense's Vulnerability Contributor Program, both of which will pay researchers for vulnerability information if they meet certain conditions.
Adobe says its Shockwave software is installed on more than 450 million desktops. Adobe has stepped up its security program as attackers have focused on trying to find vulnerabilities in its applications due to their wide installation base.
Send news tips and comments to firstname.lastname@example.org
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.