1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 |
##################################################################################### # Application: Adobe Flash Player # Platforms: Windows,OSX # Versions: 23.0.0.162 and earlier # Author: Francis Provencher of COSIG # Website: https://cosig.gouv.qc.ca/en/advisory/ # Twitter: @COSIG_ # Date: October 11, 2016 # CVE-2016-4273 # COSIG-2016-35 ##################################################################################### 1) Introduction 2) Report Timeline 3) Technical details 4) POC ##################################################################################### ================ 1) Introduction ================ Adobe Flash Player (labeled Shockwave Flash in Internet Explorer and Firefox) is a freeware software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio. Flash Player can run from a web browser as a browser plug-in or on supported mobile devices.[7] Flash Player was created by Macromedia and has been developed and distributed by Adobe Systems since Adobe acquired Macromedia. (https://en.wikipedia.org/wiki/Adobe_Flash_Player) ##################################################################################### ============================ 2) Rapport de Coordination ============================ 2016-05-17: Francis Provencher of COSIG report this vulnerability to Adobe PSIRT; 2016-05-23: Adobe PSIRT confirm this vulnerability; 2016-10-11: Adobe publish a patch (APSB16-32); 2016-10-11: Advisory released by COSIG; ##################################################################################### ===================== 3) Technical details ===================== The vulnerability allows a remote attacker to execute malicious code or access to a part of the dynamically allocated memory using a user interaction visiting a Web page or open a specially crafted SWF file, an attacker is able to create an “out of bound” memory corruption. A file with an “ActionRecord” structure that contain an invalid “ConstantPool” could lead to remote code execution in the context of the current user. ##################################################################################### =========== 4) POC: =========== https://cosig.gouv.qc.ca/wp-content/uploads/2016/10/COSIG-2016-35.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40510.zip #################################################################################### |