|
|
|
|
| |
Credit:
The information has been provided by Javier Vicente Vallejo.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=773
|
| |
Vulnerable Systems:
* Adobe Flash Player version 9.0.124.0 and prior
* Adobe Flash Player version 10.0.12.36 and prior
During the processing of a Shockwave Flash file, a particular object can be created, along with multiple references that point to the object. The object can be destroyed and its associated references removed. However a reference can incorrectly remain pointing to the object. The invalid object resides in uninitialized memory, which the attacker may control to gain arbitrary execution control.
Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the user viewing the web page. To exploit this vulnerability, a targeted user must load a malicious Shockwave Flash file created by an attacker. An attacker typically accomplishes this via social engineering or injecting content into a compromised, trusted site.
Utilizing various techniques, an attacker is able to re-allocate and control the memory used by the destroyed object. This allows the attacker to subvert execution when a virtual function is called via the invalid reference.
Patch Availability:
Adobe has released a patch which addresses this issue. For more information, consult their advisory (APSB09-01) at the following URL:
http://www.adobe.com/support/security/bulletins/apsb09-01.html
Workround
A Internet Explorer plugin is available to temporarily block and unblock Flash content using a single click. Only trusted sites should be unblocked when using this plugin. More information is available at http://flash.melameth.com.
A Firefox plugin is available to temporarily block and unblock Flash content using a single click. Only trusted sites should be unblocked when using this plugin. More information is available at: http://flashblock.mozdev.org.
CVE Information:
CVE-2009-0520
Disclosure Timeline:
08/25/2008 - Initial Contact
09/22/2008 - PoC Requested
11/05/2008 - PoC Sent
11/06/2008 - Clarification requested
12/05/2008 - Clarification Sent
12/07/2008 - Additional Clarification Sent
02/19/2009 - Draft bulletin received
02/24/2009 - Coordinated Public Disclosure
|
|
|
|
|