|
|
Flash: memory corruption with excessive CEA-708 data block length | |||
| Reported by cevans@google.com, Feb 16 2015 | Back to list | |||
To reproduce, host the attached SWF and other files on a web server (e.g. localhost) and load it like this: http://localhost/PlayManifest.swf?file=caption.m3u8 On 32-bit Chrome on Windows, v40.0.2214.111, WinDbg sees the crash like this: 6deb64eb 8b01 mov eax,dword ptr [ecx] ds:002b:41414141=???????? call dword ptr [eax+3Ch] Looks like vtable dispatch to me, with an attacker controlled "this" pointer. This is the protocol in question: http://en.wikipedia.org/wiki/CEA-708 This bug is subject to a 90 day disclosure deadline. If 90 days elapse without a broadly available patch, then the bug report will automatically become visible to the public.
Comment 1
by
cevans@google.com,
Feb 17 2015
,
Apr 10 2015
,
Apr 14 2015
,
Apr 30 2015
|
||||
| ► Sign in to add a comment | ||||