Headline
CVE-2016-1016: ZDI-16-226
Use-after-free vulnerability in the Transform object implementation in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via a flash.geom.Matrix callback, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1017, and CVE-2016-1031.
April 8th, 2016
(Pwn2Own) Adobe Flash AS2 Transform matrix Use-After-Free Remote Code Execution Vulnerability****ZDI-16-226
ZDI-CAN-3613
CVE ID
CVE-2016-1016
CVSS SCORE
6.8, (AV:N/AC:M/Au:N/C:P/I:P/A:P)
AFFECTED VENDORS
Adobe
AFFECTED PRODUCTS
Flash
TREND MICRO CUSTOMER PROTECTION
Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID [‘24024’]. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Flash. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the Transform objects. By setting a special callback on the flash.geom.Matrix object, an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute arbitrary code under the context of the current process.
ADDITIONAL DETAILS
Adobe has issued an update to correct this vulnerability. More details can be found at:
https://helpx.adobe.com/security/products/flash-player/apsb16-10.html
DISCLOSURE TIMELINE
- 2016-03-16 - Vulnerability reported to vendor
- 2016-04-08 - Coordinated public release of advisory
CREDIT
Yuki Chen of Qihoo 360 Vulcan Team
BACK TO ADVISORIES
Related news
Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, and CVE-2016-1032.