Adobe has fixed six critical vulnerabilities in Shockwave Player that could potentially be exploited by attackers to execute malicious code, via the release of version 188.8.131.528 of the software.
Five of the patched flaws are buffer overflow vulnerabilities and one is an out-of-bounds array bug. Adobe credits Will Dormann of CERT and Honggang Ren of Fortinet's FortiGuard Labs with reporting the issues.
[ The Web browser is your portal to the world -- and the gateway for security threats. InfoWorld's expert contributors show you how to secure your Web browsers. Download the free PDF today! | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]
"Adobe recommends users of Adobe Shockwave Player 184.108.40.2067 and earlier versions update to the newest version 220.127.116.118," the company said in a security advisory accompanying the release on Tuesday. The new version is available for the Windows and Mac platforms.
"Adobe is not aware of any exploits in the wild for any of the issues patched in this release," Wiebke Lips, Adobe's senior manager of corporate communications, said via email.
While not nearly as popular as Flash Player, Shockwave Player is installed on 450 million Internet-enabled desktops, according to Adobe, which might make it an attractive target for attackers. The product is required to display online content created with Adobe's Director software, such as 3D games, product demonstrations, simulations, or e-learning courses, inside browsers.