Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

What does a pointer look like, anyway?

$
0
0
In Adobe’s August 2014 Flash Player security update, we see:

 These updates resolve memory leakage vulnerabilities that could be used to bypass memory address randomization (CVE-2014-0540, CVE-2014-0542, CVE-2014-0543, CVE-2014-0544, CVE-2014-0545).

I reported the latter four of these. I’d like to thank Adobe for fixing them so quickly -- about 30 days between report and broad availability of a patch. That’s well within Project Zero’s 90-day deadline on bug disclosure.
They are all interesting bugs in image decoding, leading to uninitialized pixels in image canvases. There exist rich ActionScript APIs to read pixels out of canvases, so any uninitialized data can be examined easily by the attacker. Let’s take a visual tour of the four bugs:


more here.............http://googleprojectzero.blogspot.gr/2014/08/what-does-pointer-look-like-anyway.html

Viewing all articles
Browse latest Browse all 8064

Trending Articles