Skip to main content

Adobe Audition Session Files Processing Memory Corruption Vulnerabilities

Last Update Date: 16 May 2011 14:31 Release Date: 16 May 2011 5891 Views

RISK: High Risk

TYPE: Clients - Audio & Video

TYPE: Audio & Video

Two vulnerabilities have been identified in Adobe Audition, which could be exploited by attackers to compromise a vulnerable system. These issues are caused by buffer overflow and memory corruption errors when processing Session (.ses) files, which could be exploited by attackers to execute arbitrary code by convincing a user to open a malicious file.


Impact

  • Remote Code Execution

System / Technologies affected

  • Adobe Audition 3.0.1 and earlier versions for Windows

Solutions

  • Vulnerability Has No Patch Available

Adobe strongly recommends Audition users discontinue use of the Adobe Session (.ses) file format and switch to use of the XML session format. XML is a human-readable standard for electronically encoding documents with numerous benefits over binary formats. With the release of Audition CS5.5, the binary Audition Session (.ses) file format is no longer supported.


Vulnerability Identifier


Source


Related Link