Skip to content

Commit c988447

Browse files
committed
title enhancement, OSVDB ref
touch up title and add OSVDB reference
1 parent 013781f commit c988447

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

modules/exploits/windows/browser/adobe_flash_copy_pixels_to_byte_array.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ class Metasploit3 < Msf::Exploit::Remote
1313

1414
def initialize(info={})
1515
super(update_info(info,
16-
'Name' => 'Adobe Flash Player copyPixelsToByteArray Integer Overflow',
16+
'Name' => 'Adobe Flash Player copyPixelsToByteArray Method Integer Overflow',
1717
'Description' => %q{
1818
This module exploits an integer overflow in Adobe Flash Player. The vulnerability occurs
1919
in the copyPixelsToByteArray method from the BitmapData object. The position field of the
2020
destination ByteArray can be used to cause an integer overflow and write contents out of
2121
the ByteArray buffer. This module has been tested successfully on Windows 7 SP1 (32-bit),
22-
IE 8 to IE 11 and Flash 14.0.0.176, 14.0.0.145 and 14.0.0.125.
22+
IE 8 to IE 11 and Flash 14.0.0.176, 14.0.0.145, and 14.0.0.125.
2323
},
2424
'License' => MSF_LICENSE,
2525
'Author' =>
@@ -32,6 +32,7 @@ def initialize(info={})
3232
'References' =>
3333
[
3434
['CVE', '2014-0556'],
35+
['OSVDB', '111110'],
3536
['URL', 'http://googleprojectzero.blogspot.com/2014/09/exploiting-cve-2014-0556-in-flash.html'],
3637
['URL', 'https://code.google.com/p/google-security-research/issues/detail?id=46'],
3738
['URL', 'http://hacklab.kr/cve-2014-0556-%EB%B6%84%EC%84%9D/'],

0 commit comments

Comments
 (0)