Adobe Flash - JXR Processing Double-Free

2016-07-11T00:00:00
ID 1337DAY-ID-26077
Type zdt
Reporter Google Security Research
Modified 2016-07-11T00:00:00

Description

Exploit for multiple platform in category dos / poc

                                        
                                            Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=788
 
There is a heap overflow when loading the attacked JXR file in Adobe Flash. To reproduce, load the attached file using LoadImage.swf?img=12.atf.
 
This issue can be a bit difficult to reproduce, as the crash occurs when the player is destroyed, so the crash screen doesn't always show up on the Player. The easiest way to detect the issue is to attach a debugger to the Player and refresh a few times.
 
Took a closer look at this, it is a UaF of plane->model_hp_buffer in the open-source JXR component.
 
 
Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40088.zip

#  0day.today [2018-04-03]  #