vendor:
Flash Player
by:
bannedit
N/A
CVSS
N/A
AVM2 action script virtual machine
119
CWE
Product Name: Flash Player
Affected Version From: 9
Affected Version To: 10
Patch Exists: YES
Related CWE: CVE-2011-0609
CPE: a:adobe:flash_player
Metasploit:
https://www.rapid7.com/db/vulnerabilities/adobe-apsb11-05-CVE-2011-0609/, https://www.rapid7.com/db/vulnerabilities/adobe-apsb11-06-CVE-2011-0609/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-0372/, https://www.rapid7.com/db/vulnerabilities/adobe-air-cve-2011-0609/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-501ee07a-5640-11e0-985a-001b2134ef46/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2011-0609/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb11-06-CVE-2011-0609/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2011-0609/, https://www.rapid7.com/db/vulnerabilities/adobe-apsb11-04-CVE-2011-0609/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2011
Adobe Flash Player AVM Bytecode Verification
This module exploits a vulnerability in AVM2 action script virtual machine used in Adobe Flash Player versions 9.0 through 10. The AVM fails to properly verify bytecode streams prior to executing it. This can cause uninitialized memory to be executed. Utilizing heap spraying techniques to control the uninitialized memory region it is possible to execute arbitrary code. Typically Flash Player is not used as a standalone application. Often, SWF files are embeded in other file formats or specifically loaded via a web browser. Malcode was discovered in the wild which embeded a malformed SWF file within an Excel spreadsheet. This exploit is based off the byte stream found within that malcode sample.
Mitigation:
Adobe has released a security update to address this vulnerability. Users are advised to update to the latest version of Adobe Flash Player.