The Director module (dirapi.dll) in Adobe Shockwave Player before 11.5.9.615 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Director movie with a crafted rcsL chunk containing a field whose value is used as a pointer offset, as exploited in the wild in October 2010. NOTE: some of these details are obtained from third party information.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11285
https://exchange.xforce.ibmcloud.com/vulnerabilities/62688
http://www.vupen.com/english/advisories/2010/2752
http://www.securitytracker.com/id?1024635
http://www.kb.cert.org/vuls/id/402231
http://www.adobe.com/support/security/bulletins/apsb10-25.html
http://www.abysssec.com/blog/2010/10/adobe-shockwave-player-rcsl-chunk-memory-corruption-0day/