Lucene search

K
canvasImmunity CanvasADOBE_FLASH_VALUEOF
HistoryJul 08, 2015 - 2:59 p.m.

Immunity Canvas: ADOBE_FLASH_VALUEOF

2015-07-0814:59:00
Immunity Canvas
exploitlist.immunityinc.com
58

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.974 High

EPSS

Percentile

99.9%

Name adobe_flash_valueof
CVE CVE-2015-5119 Exploit Pack
VENDOR: Adobe
Notes:

Tested on:
- Windows 7 x86/x64 IE(32/64) 8, 9, 11

This module exploits a use after free vulnerability on Adobe Flash Player.
When you have a ByteArray object ba, and perform an assignment like this ba[0] = object, it will call this object’s ValueOf function
The ValueOf function can be overridden, so someone can change value of ba in the object ValueOf function
If you reallocate the ba memory in the ValueOf function, it will cause a UAF because ba[0] = object will save the original memory and use it after ValueOf function has been called.

IMPORTANT:

You need to setup a WIN64 MOSDEF INTEL listener in order for the callback
process to work, as the InjectToSelf shellcode doesn’t support Universal MOSDEF
yet.

Usage:
python ./exploits/clientd/clientd.py -l 192.168.1.10 -d 5555 -O server_port:8080 -O allowed_attack_modules:adobe_flash_valueof -O auto_detect_exploits:0
python commandlineInterface.py -v 17 -p5555

VersionsAffected: Adobe Flash Player > 9 and before 18.0.0.194 on Windows
Repeatability: One-shot
References: [‘http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/’]
CVE Url: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5119

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.974 High

EPSS

Percentile

99.9%