Closed GoogleCodeExporter closed 9 years ago
[Setting owner to cevans@google.com. I think we should use owner to represent
whoever is doing the comms with the vendor]
Original comment by cev...@google.com
on 28 Nov 2014 at 9:08
Updating with additional information sent to vendor in response to request for
a crash repro:
It's quite an awkward bug to provide a reliable crash repro for, as with the
way the Flash heap works the out-of-bounds reads will almost always result in a
silent failure to compile the regex - to get a crash directly from this issue
you will need good instrumentation such as ASAN. One way to see that the bug
has occurred is to instrument find_bracket in pcre_compile.cpp to print the
pointer that it's currently dereferencing, something like changing the start of
the function to:
static const uschar *
find_bracket(const uschar *code, BOOL utf8, int number)
{
for (;;)
{
register int c = *code;
fprintf(stderr, "code %p %i\n", code, c);
if (c == OP_END) return NULL;
The example shown wasn't being triggered from actionscript though, it was a
custom harness to test the regex engine, so I don't have an abc to hand. The
provided regex should cause an OOB read crash under ASAN or valgrind though
when called from the RegExp object.
See attached for a partial exploit for this issue in desktop Flash; it uses
this vulnerability to get arbitrary bytecode executed (in CompileRegex), and
then leverages this to corrupt the length of a Vector.<uint> object on the
heap. The provided file will then use this corrupted vector object to write the
value 0x41414141 to address 0x40404040. As it requires some heap manipulation,
mileage may vary - this has only been tested on the standard Flash on Windows
8.1 x64 running in 32-bit desktop Internet Explorer on my laptop.
Original comment by markbr...@google.com
on 17 Dec 2014 at 2:22
Attachments:
Supplied another crash poc to adobe.
Original comment by markbr...@google.com
on 18 Dec 2014 at 5:32
Attachments:
Original comment by cev...@google.com
on 4 Feb 2015 at 7:05
https://helpx.adobe.com/security/products/flash-player/apsb15-04.html
Original comment by cev...@google.com
on 6 Feb 2015 at 3:14
Making publicly viewable; it's 7 days post-patch and there's a corresponding
blog post:
http://googleprojectzero.blogspot.com/2015/02/exploitingscve-2015-0318sinsflash.
html
Also fixing severity to "High"
Original comment by cev...@google.com
on 12 Feb 2015 at 5:42
Adding the exploit source for the blog post, as it was pointed out that I
forgot to upload it...
Exploit has only been tested on 32-bit desktop IE running on Windows 8.1.
Original comment by markbr...@google.com
on 17 Feb 2015 at 4:19
Attachments:
Original issue reported on code.google.com by
markbr...@google.com
on 25 Nov 2014 at 10:53Attachments: