header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Use-After-Free Vulnerability in Adobe Flash Player 17.0.0.188

The crash was observed in Flash Player 17.0.0.188 on Windows due to a use-after-free related to loading a sub-resource from a URL. The crash appears to occur when a jmp instruction is executed. The test case reproduces on Windows 7 using IE11, but does not appear to immediately reproduce on Windows+Chrome or Linux+Chrome.

Use-after-free in CreateTextField

A use-after-free vulnerability exists in Adobe Flash Player due to a flaw when CreateTextField is called on a MovieClip heirarcy. If a call is made into a function that deletes the MovieClip, a use-after-free occurs. This can be exploited to execute arbitrary code by tricking a user into opening a specially crafted SWF file.

Out-of-bounds write in Adobe Flash Player

Looking at https://github.com/adobe-flash/avmplus/blob/master/core/XMLListObject.cpp: In [1], the passed in index is validated. In [2], the callback can run actionscript, which might shrink the size of the current XMLList. In [3], the pre-validated index is used but it might now be invalid due to shrinking at [2]. Unfortunately, removeAt() does not behave well in the presence of an out-of-bounds index. The PoC works by triggering a wild copy in order to demonstrate the crash. But other side-effects are possible such as decrementing the refcount of an out-of-bounds index.

Use-after-free in MovieClip.swapDepths

There is a use-after-free in MovieClip.swapDepths, a POC is as follows: var clip1 = this.createEmptyMovieClip("clip1", 1); var clip2 = this.createEmptyMovieClip("clip2", 2); var n = {valueOf: func, toString: func}; clip1.swapDepths(n); function func(){ clip1.removeMovieClip(); //_root.createEmptyMovieClip("test", 1); trace("here"); return "clip2"; } A swf and fla are attached.

Wild Pointer Target Increment Vulnerability in Adobe Flash Player

The attached sample file, signal_sigsegv_7ffff637297a_8900_e3f87b25c25db8f9ec3c975f8c1211cc.swf, crashes, perhaps relating to XML handling. The crash looks like this on Linux x64: rcx 0x303030303030300 217020518514230016. The wider context shows that the wild pointer target can be incremented with this vulnerability, which is typically enough for an exploit.

Out-of-Bounds Read

A vulnerability in Adobe Flash Player allows an attacker to read data from memory locations outside of the intended bounds of a buffer, due to improper bounds checking. This can lead to information disclosure, and potentially code execution. This vulnerability affects Adobe Flash Player versions prior to 32.0.0.371.

Use-after-free Vulnerability in Adobe Flash Player

A use-after-free vulnerability exists in Adobe Flash Player versions 17.0.0.188 and earlier. The vulnerability is caused by a non-deterministic condition that can lead to a crash when accessing memory after it has been freed. This can be exploited to execute arbitrary code by tricking a user into opening a specially crafted SWF file.

Recent Exploits: