
17 new exploits Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (2) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (3) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (4) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (5) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (6) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (7) Adobe Flash Player 22.0.0.192 - DefineBitsJPEG2 Memory Corruption Adobe Flash Player 22.0.0.192 - DefineSprite Memory Corruption Adobe Flash Player 22.0.0.192 - TAG Memory Corruption Adobe Flash Player 22.0.0.192 - SceneAndFrameData Memory Corruption Windows x86 URLDownloadToFileA()+SetFileAttributesA()+WinExec()+ExitProcess() Shellcode GSX Analyzer 10.12 and 11 - Main.swf Hardcoded Superadmin Credentials MS16-032 Secondary Logon Handle Privilege Escalation Riverbed SteelCentral NetProfiler/NetExpress Remote Code Execution Apache Archiva 1.3.9 - Multiple CSRF Vulnerabilities Linux x86 Reverse Shell using Xterm ///usr/bin/xterm -display 127.1.1.1:10
57 lines
No EOL
2.3 KiB
Text
Executable file
57 lines
No EOL
2.3 KiB
Text
Executable file
#####################################################################################
|
||
|
||
# Application: Adobe Flash Player
|
||
# Platforms: Windows,OSX
|
||
# Versions: 22.0.0.192 and earlier
|
||
# Author: Francis Provencher of COSIG
|
||
# Website: https://cosig.gouv.qc.ca/avis/
|
||
# Twitter: @COSIG_
|
||
# Date: 12 juillet 2016
|
||
# CVE-2016-4177
|
||
# COSIG-2016-21
|
||
|
||
#####################################################################################
|
||
|
||
1) Introduction
|
||
2) Report Timeline
|
||
3) Technical details
|
||
4) POC
|
||
|
||
#####################################################################################
|
||
|
||
===============
|
||
1) Introduction
|
||
===============
|
||
Adobe Flash Player (labeled Shockwave Flash in Internet Explorer and Firefox) is a freeware software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio. Flash Player can run from a web browser as a browser plug-in or on supported mobile devices.[7] Flash Player was created by Macromedia and has been developed and distributed by Adobe Systems since Adobe acquired Macromedia.
|
||
|
||
(https://en.wikipedia.org/wiki/Adobe_Flash_Player)
|
||
|
||
#####################################################################################
|
||
|
||
====================
|
||
2) Report Timeline
|
||
====================
|
||
2016-05-10: Francis Provencher du COSIG of COSIG report this vulnerability to Adobe PSIRT;
|
||
2016-05-17: Adobe PSIRT confirm this vulnerability;
|
||
2016-07-12: Adobe publish a patch (APSB16-25);
|
||
2016-07-12: Advisory released by COSIG;
|
||
|
||
#####################################################################################
|
||
|
||
=====================
|
||
3) Technical details
|
||
=====================
|
||
|
||
The vulnerability allows a remote attacker to execute malicious code or access to a part of the dynamically allocated memory using a user interaction
|
||
visiting a Web page or open a specially crafted SWF file, which contains ‘SceneAndFrameData’ invalid data.
|
||
|
||
#####################################################################################
|
||
|
||
===========
|
||
4) POC:
|
||
===========
|
||
|
||
https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-21.zip
|
||
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40104.zip
|
||
|
||
############################################################################### |