Multiple Flash Authoring Heap Overflows - Malformed SWF Files

2008-10-15 / 2008-10-16
Credit: Paul Craig
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


CVSS Base Score: 9.3/10
Impact Subscore: 10/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

======================================================================== Multiple Flash Authoring Heap Overflows - Malformed SWF Files Vendor Website: http://www.adobe.com Affected Versions: Adobe Flash Professional CS3/Flash MX2004 Vendor Notified. July 2008 Public Disclosure. October 16th 2008 Researcher: Paul Craig - paul.craig <at> security-assessment.com http://www.security-assessment.com/files/advisories/2008-10-16_Multiple_Flash_Authoring_Heap_Overflows.pdf http://www.adobe.com/go/apsa08-09 ======================================================================== ============================ Overview ================================== During analysis of the SWF file format used by commercial Flash authoring applications multiple heap overflows were discovered within Adobe Flash CS3 Professional, and Adobe Flash MX 2004. Heap overflow conditions occurred when opening or importing malformed .SWF files within the Flash authoring applications. Exploitable conditions were related to excessively long control parameters within an SWF file, which resulted in a heap overflow condition. Exploitation of the heap overflow conditions would allow a malicious user to gain command execution on the system which opened the file. Only the Flash authoring software was found to insecurely parse malformed .SWF files. The Flash player was NOT found to be vulnerable to these specific attacks. =========================== Solutions ================================== A patch has been released from Adobe to address this vulnerability within CS3. Additionally Adobe Flash CS4 has been officially released which resolves these particular vulnerabilities. ============================ Credit ==================================== Discovered and advised to Adobe in July 2008 by Paul Craig of Security-Assessment.com ======================== About Security-Assessment.com ================= Security-Assessment.com is Australasia's leading team of Information Security consultants specialising in providing high quality Information Security services to clients throughout the Asia Pacific region. Our clients include some of the largest globally recognised companies in areas such as finance, telecommunications, broadcasting, legal and government. Our aim is to provide the very best independent advice and a high level of technical expertise while creating long and lasting professional relationships with our clients. Security-Assessment.com is committed to security research and development, and its team continues to identify and responsibly publish vulnerabilities in public and private software vendor's products. Members of the Security-Assessment.com R&D team are globally recognised through their release of whitepapers and presentations related to new security research. Paul Craig Principal Security Consultant Security-Assessment.com

References:

http://xforce.iss.net/xforce/xfdb/45914
http://www.securityfocus.com/bid/31769
http://www.securityfocus.com/archive/1/archive/1/497397/100/0/threaded
http://www.frsirt.com/english/advisories/2008/2837
http://www.adobe.com/support/security/advisories/apsa08-09.html
http://securitytracker.com/id?1021060
http://security-assessment.com/files/advisories/2008-10-16_Multiple_Flash_Authoring_Heap_Overflows.pdf
http://secunia.com/advisories/32246


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top