Adobe Audition Session File TRKM Stack Buffer Overflow (APSB11-10; CVE-2011-0615)
|Check Point Reference:||CPAI-2011-320|
|Source:||Adobe Security Bulletin APSB11-10|
|Protection Provided by:||
Who is Vulnerable?
Adobe Audition 3.0.1 and earlier versions for Windows
A memory corruption vulnerability has been reported in Adobe Audition that could lead to arbitrary code execution. An attacker can exploit this vulnerability by enticing a user to open a malicious Session file. Successful exploitation will result in a stack buffer overflow and could cause a crash and potentially allow an attacker to take control of the affected system.
This is a memory corruption vulnerability. The vulnerability is due to an error when processing TRKM chunks in Session files (SES).Successful exploitation will result in a stack buffer overflow and could cause a crash and potentially allow an attacker to take control of the affected system.
This protection will detect and block malformed Session files.
To configure the defense, select your product from the list below and follow the related protection steps.
Security Gateway R75 / R71 / R70
How Can I Protect My Network?
1. In the IPS tab, click Protections and find the Adobe Audition Session File TRKM Stack Buffer Overflow (APSB11-10) protection using the Search tool and Edit the protection's settings. 2. Install policy on all modules.
How Do I Know if My Network is Under Attack?
SmartView Tracker will log the following entries:
Attack Name: Adobe Products Violation
Attack Information: Adobe Audition Session File TRKM stack buffer overflow (APSB11-10)