vendor:
Flash Player
by:
Google Security Research
7.5
CVSS
HIGH
Out-of-bounds write
125
CWE
Product Name: Flash Player
Affected Version From: 18.0.0.194
Affected Version To: 18.0.0.232
Patch Exists: YES
Related CWE: CVE-2015-7645
CPE: a:adobe:flash_player
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2015-2024/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2015-1913/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2015-7645/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2015-7645/, https://www.rapid7.com/db/vulnerabilities/adobe-flash-apsb15-27-cve-2015-7645/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2015
Out-of-bounds write in Adobe Flash Player
Looking at https://github.com/adobe-flash/avmplus/blob/master/core/XMLListObject.cpp: In [1], the passed in index is validated. In [2], the callback can run actionscript, which might shrink the size of the current XMLList. In [3], the pre-validated index is used but it might now be invalid due to shrinking at [2]. Unfortunately, removeAt() does not behave well in the presence of an out-of-bounds index. The PoC works by triggering a wild copy in order to demonstrate the crash. But other side-effects are possible such as decrementing the refcount of an out-of-bounds index.
Mitigation:
Update to the latest version of Adobe Flash Player