New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 642691 link

Starred by 2 users

Issue metadata

Status: Fixed
Owner:
Last visit > 30 days ago
Closed: Feb 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Windows
Pri: 1
Type: Bug-Security



Sign in to add a comment

Adobe Flash Player NetStream Use-After-Free Remote Code Execution Vulnerability

Reported by bee1...@gmail.com, Aug 31 2016

Issue description

Hello,

There is a UAF Vulnerability in Adobe Flash Player which could lead to Remote Code Execution Vulnerability.

Tested Platforms: 
1) Windows 7 SP1 x86 + Flash Player 23 Beta Standalone(23.0.0.151) with page heap enabled (gflags.exe -I flashplayer_23_sa.exe +ust +hpa)

When using flashplayer_23_sa.exe to load the Poc.swf, it manifests itself in the form of the following crash:

---cut---

0:000> r
eax=0000000c ebx=00000000 ecx=0806b430 edx=00000000 esi=07f92f70 edi=0490c020
eip=001b852b esp=0114daf0 ebp=0114dc44 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00010206
FlashPlayer!WinMainSandboxed+0x159532:
001b852b 8b01            mov     eax,dword ptr [ecx]  ds:0023:0806b430=????????
001b852d 53              push    ebx
001b852e 8d9680000000    lea     edx,[esi+80h]
001b8534 52              push    edx
001b8535 8d5674          lea     edx,[esi+74h]
001b8538 52              push    edx
001b8539 53              push    ebx
001b853a 53              push    ebx
001b853b 53              push    ebx
001b853c ff761c          push    dword ptr [esi+1Ch]
001b853f ff7610          push    dword ptr [esi+10h]
001b8542 ff500c          call    dword ptr [eax+0Ch]

0:000> kb
ChildEBP RetAddr  Args to Child              
0114dc44 006e1c14 00000000 00000004 0114dc6c FlashPlayer!WinMainSandboxed+0x159532
0114dc54 778d4f56 006e20be 00000000 00000004 FlashPlayer!IAEModule_AEModule_PutKernel+0x180164
0114dc6c 778d5083 0114dd2c 0114dcb0 00000024 ntdll!RtlpWalk32BitStack+0x73
0114dccc 7795e531 00000000 081fff80 0115a868 ntdll!RtlWalkFrameChain+0x73
0114dd34 6605c23f 081ef0a4 06c90f70 0989f5e0 ntdll!RtlpStdLockRelease+0xa
0114de04 755abf52 ffffffff 0114d000 0114de54 d3d9!Direct3DCreate9Ex+0xf56a
0114de1c 000946b8 0114d000 0114de54 0000001c KERNELBASE!VirtualQuery+0x15
0114de88 000a910d 0471a280 0490665c 001bb3b7 FlashPlayer!WinMainSandboxed+0x356bf
0114de94 001bb3b7 0114dee8 001bb3be 00000000 FlashPlayer!WinMainSandboxed+0x4a114
0114de9c 001bb3be 00000000 04906000 0490665c FlashPlayer!WinMainSandboxed+0x15c3be
0114dee8 0008969e 04906000 0490665c 0114df2a FlashPlayer!WinMainSandboxed+0x15c3c5
0114dfa0 0008c3cc 00000001 00000001 04906000 FlashPlayer!WinMainSandboxed+0x2a6a5
0114e0e4 00099880 00000001 00000001 00000000 FlashPlayer!WinMainSandboxed+0x2d3d3
0114e100 778d4f56 006e1675 00000000 00000004 FlashPlayer!WinMainSandboxed+0x3a887
0114e118 0114e1a4 00000000 773fc5ab 00c5cd4c ntdll!RtlpWalk32BitStack+0x73
0114e208 00231905 002907de 00000113 00000001 0x114e1a4
00000000 00000000 00000000 00000000 00000000 FlashPlayer!WinMainSandboxed+0x1d290c

0:000> !heap -p -a ecx
    address 0806b430 found in
    _DPH_HEAP_ROOT @ 4591000
    in free-ed allocation (  DPH_HEAP_BLOCK:         VirtAddr         VirtSize)
                                    7eb3a90:          806b000             e000
    6a8e90b2 verifier!AVrfDebugPageHeapFree+0x000000c2
    77967904 ntdll!RtlDebugFreeHeap+0x0000002f
    7792ad81 ntdll!RtlpFreeHeap+0x0000005d
    778f73a6 ntdll!RtlFreeHeap+0x00000142
    773fc584 kernel32!HeapFree+0x00000014

---cut---

This Vulnerability was discovered by 'bo13oy of CloverSec Labs'.

Thank you,

bo13oy
CloverSec Labs
 
poc.zip
1.2 KB Download

Comment 1 by vakh@chromium.org, Sep 1 2016

Components: Internals>Plugins>Flash
Owner: natashenka@google.com
natashenka@ -- can you please take a look at this? Thanks.

Comment 2 by vakh@chromium.org, Sep 1 2016

Labels: Security_Severity-Medium Security_Impact-Beta OS-Windows
Looks good, I'll report it to Adobe
Status: Assigned (was: Unconfirmed)
Project Member

Comment 5 by sheriffbot@chromium.org, Sep 1 2016

Labels: M-53
Project Member

Comment 6 by sheriffbot@chromium.org, Sep 1 2016

Labels: ReleaseBlock-Stable
Project Member

Comment 7 by sheriffbot@chromium.org, Sep 1 2016

Labels: Pri-1
Cc: awhalley@chromium.org
+awhalley@
Labels: -ReleaseBlock-Stable
Won't block M53 stable release; will have to wait until next drop from Adobe.
Project Member

Comment 10 by sheriffbot@chromium.org, Sep 2 2016

Labels: -Security_Impact-Beta Security_Impact-Stable
Project Member

Comment 11 by sheriffbot@chromium.org, Sep 15 2016

natashenka: Uh oh! This issue still open and hasn't been updated in the last 14 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Project Member

Comment 12 by sheriffbot@chromium.org, Sep 30 2016

natashenka: Uh oh! This issue still open and hasn't been updated in the last 29 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Comment 13 by bee1...@gmail.com, Oct 7 2016

It seems this issue hasn't been updated for a long time. I would like to know whether this case has been properly handled and reported to Adobe. Thanks.
natashenka@, would you mind giving an update? What did Adobe say?
Project Member

Comment 15 by sheriffbot@chromium.org, Oct 13 2016

Labels: -M-53 M-54
Cc: adobe-flash@chromium.org ihf@chromium.org
natashenka: ping :) Any updates on this? 

Comment 17 by jecl...@adobe.com, Nov 28 2016

I believe that this is Adobe PSIRT 5799, which is CVE-2016-6981, and was fixed in the following versions: 23.0.0.185, 18.0.0.382, 11.2.202.637


Yes, that's the case, this bug is fixed and ready for the rewards panel
Project Member

Comment 19 by sheriffbot@chromium.org, Dec 2 2016

Labels: -M-54 M-55
Project Member

Comment 20 by sheriffbot@chromium.org, Jan 26 2017

Labels: -M-55 M-56
Status: Fixed (was: Assigned)
Marking as fixed based on #18. +awhalley: does this need to be tagged for the rewards panel?
Labels: reward-topanel
It only hits my VRP queries once marked as fixed.  It's now in the queue for consideration.  Cheers!
Project Member

Comment 23 by sheriffbot@chromium.org, Feb 24 2017

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Labels: -reward-topanel reward-unpaid reward-3000
Congratulations! The panel decided to award $3,000 for this bug.

Comment 26 by bee1...@gmail.com, Mar 14 2017

Thanks!
Labels: -reward-unpaid reward-inprocess
Project Member

Comment 28 by sheriffbot@chromium.org, Jun 2 2017

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Sign in to add a comment