Lucene search

K
zdtGoogle Security Research1337DAY-ID-26077
HistoryJul 11, 2016 - 12:00 a.m.

Adobe Flash - JXR Processing Double-Free

2016-07-1100:00:00
Google Security Research
0day.today
36

0.961 High

EPSS

Percentile

99.3%

Exploit for multiple platform in category dos / poc

Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=788
 
There is a heap overflow when loading the attacked JXR file in Adobe Flash. To reproduce, load the attached file using LoadImage.swf?img=12.atf.
 
This issue can be a bit difficult to reproduce, as the crash occurs when the player is destroyed, so the crash screen doesn't always show up on the Player. The easiest way to detect the issue is to attach a debugger to the Player and refresh a few times.
 
Took a closer look at this, it is a UaF of plane->model_hp_buffer in the open-source JXR component.
 
 
Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40088.zip

#  0day.today [2018-04-03]  #