Exploit Adobe Flash - Type Confusion in IExternalizable.readExternal When Performing Local Serialization

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
38969
Проверка EDB
  1. Пройдено
Автор
GOOGLE SECURITY RESEARCH
Тип уязвимости
DOS
Платформа
MULTIPLE
CVE
cve-2015-7647
Дата публикации
2015-12-14
Adobe Flash - Type Confusion in IExternalizable.readExternal When Performing Local Serialization
Код:
Source: https://code.google.com/p/google-security-research/issues/detail?id=548

If IExternalizable.readExternal is overridden with a value that is not a function, Flash assumes it is a function even though it is not one. This leads to execution of a 'method' outside of the ActionScript object's ActionScript vtable, leading to memory corruption.

A sample swf is attached. ActionScript code is also attached, but it does not compile to the needed to swf. To get the PoC, decompress the swf using flasm -x myswf, and then search for "teadExternal" and change it to "readExternal".


Proof of Concept:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38969.zip
 
Источник
www.exploit-db.com

Похожие темы