header-logo
Suggest Exploit
vendor:
Flash Player
by:
Google Security Research
7.8
CVSS
HIGH
Out-of-bounds write
787
CWE
Product Name: Flash Player
Affected Version From: Adobe Flash Player 15.0.0.223 and earlier
Affected Version To: Adobe Flash Player 18.0.0.203 and earlier
Patch Exists: YES
Related CWE: CVE-2015-3006
CPE: a:adobe:flash_player
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2015

Out-of-bounds write in Flash Player

An out-of-bounds write vulnerability exists in Adobe Flash Player. The vulnerability is caused due to an indexing error when the rdi “base” address is in bounds but add on 2*rdx and the address is not in bounds. This can be exploited to corrupt memory via a specially crafted SWF file.

Mitigation:

Users should update to the latest version of Adobe Flash Player.
Source

Exploit-DB raw data:

Source: https://code.google.com/p/google-security-research/issues/detail?id=426&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id

To reproduce, host the attached files appropriately, and:

http://localhost/LoadMP4.swf?file=crash3006694.flv

If there is no crash at first, refresh the page a few times.

With a debugger attached to 64-bit Flash in Chrome Linux, the crash manifests like this:

=> 0x00007f7779846eee:	mov    %ax,(%rdi,%rdx,2)

rax            0xff69
rdi            0x7f7778b70000
rdx            0x160b

7f777861e000-7f7778b72000 rw-p 00000000 00:00 0 
7f7778b72000-7f7779228000 ---p 00000000 00:00 0 

It looks like an indexing error; the rdi "base" address is in bounds but add on 2*rdx and the address is not in bounds.

Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37880.zip