Tag Archives: Adobe Flash

Emergency Patch APSB16-01 For Flash Player 0day CVE-2015-8651

Adobe has release, the December 28th 2015, an emergency patch for Adobe Flash Player dealing with 19 vulnerabilities. This security bulletin has a Critical severity rating.

APSB16-01 is concerning:

  • Adobe Flash Player Desktop Runtime and earlier for Windows and Macintosh
  • Adobe Flash Player Extended Support Release and earlier for Windows and Macintosh
  • Adobe Flash Player for Google Chrome and earlier for Windows, Macintosh, Linux and ChromeOS
  • Adobe Flash Player for Microsoft Edge and Internet Explorer 11 and earlier for Windows 10
  • Adobe Flash Player for Internet Explorer 10 and 11 and earlier for Windows 8.0 and 8.1
  • Adobe Flash Player for Linux and earlier for Linux
  • AIR Desktop Runtime and earlier for Windows and Macintosh
  • AIR SDK and earlier for Windows, Macintosh, Android and iOS
  • AIR SDK & Compiler and earlier for Windows, Macintosh, Android and iOS
  • AIR for Android and earlier for Android

In particular, a vulnerability with CVE-2015-8651 identifier, that has been discovered by Kai Wang and Hunter Gao of Huawei’s, is reporting exploited in the wild in limited targeted attacks. No details have been provided on this vulnerability, but surely it is time to patch otherwise why did Adobe release an emergency patch during Christmas period, a coordinated disclosure for limited targeted attacks would have been sufficient and could have wait beginning of January.

CVE-2014-0556 Adobe Flash Player copyPixelsToByteArray Method Integer Overflow

Timeline :

Vulnerability discovered by Chris Evans of Project Zero team at Google in 2014-07
Patched by the vendor via APSB14-21 the 2014–09-09
First public PoC provide by hdarwin on Packet Storm the 2014-09-30
Vulnerability reported integrated into exploit kits the 2014-10-20
Metasploit PoC provided the 2015-04-15

PoC provided by :

Chris Evans
Nicolas Joly
juan vazquez

Reference(s) :


Affected version(s) :

Adobe Flash Player and earlier versions

Tested on :

with Adobe Flash Player (flashplayer14_0r0_176_winax.exe) and Internet Explorer 8 on Windows 7 SP1

Description :

This module exploits an integer overflow in Adobe Flash Player. The vulnerability occurs in the copyPixelsToByteArray method from the BitmapData object. The position field of the destination ByteArray can be used to cause an integer overflow and write contents out of the ByteArray buffer. This module has been tested successfully on: * Windows 7 SP1 (32-bit), IE 8 to IE 11 and Flash,, and * Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash * Windows 8.1, Firefox 38.0.5 and Adobe Flash

Commands :

use exploit/windows/browser/adobe_flash_copy_pixels_to_byte_array
set PAYLOAD windows/meterpreter/reverse_tcp