[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Adobe Flash - textfield Constructor Type Confusion

Author
Google Security Research
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-25835
Category
dos / poc
Date add
17-02-2016
CVE
CVE-2016-0985
Platform
multiple
Source: https://code.google.com/p/google-security-research/issues/detail?id=701
 
There is a type confusion vulnerability in the TextField constructor in AS3. When a TextField is constructed, a generic backing object is created and reused when subsequent TextField objects are created. However, if an object with the same ID has already been created in the SWF, it can be of the wrong type. The constructor contains a check for this situation, though, and throws an exception and sets a flag to shut down the player if this occurs. The backing object is then set to be of type TextField to avoid any modifications that have been made on it by the constructor from causing problems if it is used as an object of its original type elsewhere in the player.
 
However, if the exception thrown by the constructor is caught, the exception handler can create another TextField object, and since the type of the generic backing object has been changed, an object of the wrong type is now backing the TextField, which makes it possible to set the pointers in the object to integer values selected by the attacker.
 
The PoC swf for this issue needs to be created by hand. The original swf code is:
 
try{
 
     var t = new TextField();
 
} catch(e:Error){
 
     var t2 = new TextField();
     t2.gridFitType;
 
}
 
Then in the swf, a backing object of a different type with ID 0xfff9 is created, which causes the first constructor call to fail, and the second to cause type confusion.
 
 
Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39461.zip

#  0day.today [2024-12-25]  #