Issue metadata
Sign in to add a comment
|
Security: Use after free vulnerability about psdk in the latest version of Flash player
Reported by
jiezengo...@gmail.com,
Aug 25 2017
|
||||||||||||||||||||||||||
Issue descriptionVULNERABILITY DETAILS This is a UAF vulnerability about psdk. VERSION Flash Version: pepflashplayer32_26_0_0_151 Operating System: windows 7 x86 (other operating systems may also crash,but not test) REPRODUCTION CASE There are 2 poc file here. The first one will crash when open the file which name is uaf_poc_open.swf The second one will crash when quit Chrome which name is uaf_poc_quit.swf FOR CRASHES, PLEASE INCLUDE THE FOLLOWING ADDITIONAL INFORMATION Type of crash: 636b9425 83c108 add ecx,8 636b9428 6a00 push 0 636b942a 8b01 mov eax,dword ptr [ecx] 636b942c ff5004 call dword ptr [eax+4] ds:0023:feeefef2=???????? Crash State: 4:049> dd ecx 003cd418 feeefeee feeefeee feeefeee feeefeee 003cd428 feeefeee feeefeee feeefeee feeefeee 003cd438 feeefeee feeefeee feeefeee feeefeee 003cd448 feeefeee feeefeee feeefeee feeefeee 003cd458 feeefeee feeefeee feeefeee feeefeee 003cd468 feeefeee feeefeee feeefeee feeefeee 003cd478 feeefeee feeefeee feeefeee feeefeee
,
Aug 25 2017
,
Aug 28 2017
natashenka@, would you be the right person to look at this?
,
Aug 28 2017
,
Aug 29 2017
,
Aug 29 2017
,
Aug 31 2017
I'm sorry I forgot something shown below. Credit is to "JieZeng of Tencent Zhanlu Lab". Please report it as soon as possible.
,
Sep 6 2017
,
Sep 8 2017
natashenka: Uh oh! This issue still open and hasn't been updated in the last 14 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers? If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one? If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started. Thanks for your time! To disable nags, add the Disable-Nags label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Sep 8 2017
Thanks, I've reported this to Adobe.
,
Sep 19 2017
ihf: do we typically mark these as externaldependency once they have been reported?
,
Sep 19 2017
Yes, ExternalDependency is correct here. Normally I would also CC/assign Adobe the bug, but it sounds like in this case this is different?
,
Sep 19 2017
Yeah, for security bugs, we send them to the Adobe Security Team. So just cc me on these bugs and I can send them in.
,
Oct 18 2017
,
Nov 15 2017
@natashenka hi! This bug has been fixed, but I have questions. Why the acknowledgments is "Jie Zeng of Tencent Zhanlu Lab" instead of "JieZeng of Tencent Zhanlu Lab working with the Chromium Vulnerability Rewards Program" on this page: https://helpx.adobe.com/security/products/flash-player/apsb17-33.html?
,
Dec 7 2017
,
Dec 8 2017
@natashenka hi! Can anyone answer my question here? I reported 3 bugs,they are issue 758848 , 768762 ,758863. And there are only 2 CVEs credit to me on the November's Adobe Security Bulletins and Advisories page: https://helpx.adobe.com/security/products/flash-player/apsb17-33.html . And all of 3 bugs are fixed. Thanks!
,
Dec 8 2017
Issue 758848 is still open with Adobe, I'll check what's going on with it.
,
Dec 8 2017
According to Adobe: We found that PSIRT-7347 was a dupe of PSIRT-7239 (CVE-2017-11215). So one issue was a duplicate.
,
Dec 9 2017
Hi! I do not know how Adobe definition repeated submission,but I know they may be wrong. If there are duplicate pocs, they should be issue 768762 and issue 758863 .But their trigger path is different. Thanks.
,
Jan 2 2018
Anyone there? Why two months have passed without any new progress?
,
Jan 2 2018
Sorry, can you provide a quick explanation of why you think they are different bugs, and I'll provide it to Adobe?
,
Jan 3 2018
Hi natashenka! I was wrong in comment 19 and we start from here. First: I want to know PSIRT-7347 is which one issue in comment 22 ? I assume PSIRT-7347 is issue 768762 ,because Issue 758848 and Issue 758863 were fixed in the November patch(I saw pocs form November mapp). And I also know the PSIRT-7239 (CVE-2017-11215) is Issue 758848 . So I will explanation Issue 768762 is different from Issue 758848 or Issue 758863 . Second: The reason is as follows: The key point is to register the event handler in Issue 768762 ,and free the problem object in the event handler.The source code is as follows: public function main(){ //some code try{ mediaPlayer = PSDK.pSDK.createMediaPlayer(eventDisp); } catch(e:Error){} //... try{ mediaPlayer.addEventListener(118,Listen); } catch(e:Error){} } public funciton Listen(e:PSDKEvent){ //free internally try{ audSetting.getObject.call(contentResolver,ob_toStr); } catch(e:Error){} try{ tempVar3 = psdk.createMediaPlayer(eventDisp); } catch(e:Error){} try{ audSetting.setObject(ob_toStr,tempVar3); } catch(e:Error){} try{ tempVar3 = psdk.createDispatcher(); } catch(e:Error){} return; } However in Issue 758848 or Issue 758863 do not have the register the event handler code. So their trigger path are different. Last: Please contact me if have any other questions!
,
Jan 3 2018
PSIRT-7347 is 768762. I'll send this info to Adobe and see what they say.
,
Jan 3 2018
PSIRT-7347 is 768762 and PSIRT-7239 is 758863. I'll give Adobe your explanation and let you know what I hear.
,
Jan 5 2018
Thanks!
,
Jan 15 2018
Adobe doesn't have any response?
,
Jan 16 2018
From Adobe: Apologies for the delayed reply. While we agree that the two submissions are not exactly the same, they are nevertheless related, and were resolved with the same code change. This is the dev's comment: I can see that this is a problem revolving around the MediaPlayer object being released similarly to how the QOSProvider object was mistakenly released in PSIRT-7239. The fix for PSIRT-7239 was a very general fix and repairs issues with QOSProvider, MediaPlayer and MediaPlayerItemLoader.
,
Jan 17 2018
Ok, I understand. I agree.
,
Jan 25 2018
,
Jan 25 2018
,
Jan 29 2018
,
Jan 31 2018
,
Feb 5 2018
*** Boilerplate reminders! *** Please do NOT publicly disclose details until a fix has been released to all our users. Early public disclosure may cancel the provisional reward. Also, please be considerate about disclosure when the bug affects a core library that may be used by other products. Please do NOT share this information with third parties who are not directly involved in fixing the bug. Doing so may cancel the provisional reward. Please be honest if you have already disclosed anything publicly or to third parties. Lastly, we understand that some of you are not interested in money. We offer the option to donate your reward to an eligible charity. If you prefer this option, let us know and we will also match your donation - subject to our discretion. Any rewards that are unclaimed after 12 months will be donated to a charity of our choosing. *********************************
,
Feb 6 2018
Hi jiezengoftencentzhanlulab@! The VRP decided to award $5,000 for this report. Many thanks!
,
Feb 6 2018
,
Feb 6 2018
OK,I will do not publicly disclose details with others,but until when? This bug has been fixed two months ago.
,
Feb 8 2018
,
Feb 8 2018
,
Feb 9 2018
This bug requires manual review: M65 has already been promoted to the beta branch, so this requires manual review Please contact the milestone owner if you have questions. Owners: cmasso@(Android), cmasso@(iOS), bhthompson@(ChromeOS), govind@(Desktop) For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Feb 9 2018
[Bulk Edit] +awhalley@ (Security TPM) for M65 merge review
,
Feb 9 2018
No merge needed.
,
Mar 6 2018
,
Mar 6 2018
,
Mar 6 2018
Apologies, you're OK to disclose this and 758848 now. We push flash updates out of band of the main release cycle so this didn't get picked up for release notes until now.
,
Mar 7 2018
The CVE number may not be correct, and the correct CVE should be CVE-2017-11215 or CVE-2017-11225?
,
Mar 7 2018
Thanks for flagging! Fixing here and on the release blog.
,
Apr 25 2018
,
May 4 2018
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot |
|||||||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||||||
Comment 1 by jiezengo...@gmail.com
, Aug 25 2017