Lucene search

K
exploitdbGoogle Security ResearchEDB-ID:38969
HistoryDec 14, 2015 - 12:00 a.m.

Adobe Flash - Type Confusion in IExternalizable.readExternal When Performing Local Serialization

2015-12-1400:00:00
Google Security Research
www.exploit-db.com
14

AI Score

7.4

Confidence

Low

Source: https://code.google.com/p/google-security-research/issues/detail?id=548

If IExternalizable.readExternal is overridden with a value that is not a function, Flash assumes it is a function even though it is not one. This leads to execution of a 'method' outside of the ActionScript object's ActionScript vtable, leading to memory corruption.

A sample swf is attached. ActionScript code is also attached, but it does not compile to the needed to swf. To get the PoC, decompress the swf using flasm -x myswf, and then search for "teadExternal" and change it to "readExternal".


Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38969.zip