Closed GoogleCodeExporter closed 9 years ago
Original comment by cev...@google.com
on 8 Oct 2014 at 5:39
Original comment by cev...@google.com
on 8 Nov 2014 at 2:37
Original comment by cev...@google.com
on 20 Nov 2014 at 12:53
http://helpx.adobe.com/security/products/flash-player/apsb14-24.html
Original comment by cev...@google.com
on 20 Nov 2014 at 1:26
Attaching a libpepflashplayer.so for Chrome Linux x64.
It's based on:
Google Chrome 41.0.2272.89 (Official Build)
Flash 17.0.0.134
... but with the vulnerability patched back in, which can be done with the
following (unique) asm opcode edit:
0x41 0xbc 0x1e 0x05 0x00 0x00 mov $0x51e,%r12d
->
0x41 0xbc 0xde 0x03 0x00 0x00 mov $0x3de,%r12d
This may be useful in case anyone wished to play with this vulnerability.
Original comment by cev...@google.com
on 12 Mar 2015 at 8:14
Attachments:
Attaching a working exploit for Linux x64; lots of notes inside the source file.
Original comment by cev...@google.com
on 19 Mar 2015 at 8:33
Attachments:
Blog post for this exploit:
http://googleprojectzero.blogspot.ca/2015/03/taming-wild-copy-parallel-thread.ht
ml
Original comment by cev...@google.com
on 19 Mar 2015 at 8:42
This exploit was presented at CanSecWest. Attaching a PDF of the slides used.
Original comment by cev...@google.com
on 19 Mar 2015 at 8:45
Attachments:
Original issue reported on code.google.com by
cev...@google.com
on 8 Oct 2014 at 12:45Attachments: