Skip to content

Commit e151e38

Browse files
committed
Land rapid7#5489, @wchen-r7's flash exploit descriptions update
2 parents 935ed41 + 318f67f commit e151e38

File tree

3 files changed

+12
-6
lines changed

3 files changed

+12
-6
lines changed

modules/exploits/multi/browser/adobe_flash_net_connection_confusion.rb

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,11 @@ def initialize(info={})
1919
to corrupt arbitrary memory. It can be used to overwrite dangerous objects, like
2020
vectors, and finally accomplish remote code execution. This module has been tested
2121
successfully on:
22-
* Windows 7 SP1 (32-bit) with IE 8, IE11 and Adobe Flash 16.0.0.305
23-
* Linux Mint "Rebecca" (32 bits), and Ubuntu 14.04.2 LTS with Firefox 33.0 and
24-
Adobe Flash 11.2.202.404.
22+
* Windows 7 SP1 (32-bit), IE 8, IE11 and Adobe Flash 16.0.0.305.
23+
* Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 16.0.0.305.
24+
* Windows 8.1, Firefox 38.0.5 and Adobe Flash 16.0.0.305.
25+
* Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.424.
26+
* Ubuntu 14.04.2 LTS, Firefox 33.0 and Adobe Flash 11.2.202.442.
2527
},
2628
'License' => MSF_LICENSE,
2729
'Author' =>

modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,9 @@ def initialize(info={})
1919
to uncompress() a malformed byte stream. This module has been tested successfully
2020
on:
2121
* Windows 7 SP1 (32 bits), IE 8 to IE 11 and Flash 16.0.0.287, 16.0.0.257 and 16.0.0.235.
22-
* Linux Mint "Rebecca" (32 bits) with Firefox 33.0 and Flash 11.2.202.404.
22+
* Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 16.0.0.287.
23+
* Windows 8.1, Firefox 38.0.5 and Adobe Flash 16.0.0.305.
24+
* Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Flash 11.2.202.424.
2325
},
2426
'License' => MSF_LICENSE,
2527
'Author' =>

modules/exploits/windows/browser/adobe_flash_copy_pixels_to_byte_array.rb

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,10 @@ def initialize(info={})
1717
This module exploits an integer overflow in Adobe Flash Player. The vulnerability occurs
1818
in the copyPixelsToByteArray method from the BitmapData object. The position field of the
1919
destination ByteArray can be used to cause an integer overflow and write contents out of
20-
the ByteArray buffer. This module has been tested successfully on Windows 7 SP1 (32-bit),
21-
IE 8 to IE 11 and Flash 14.0.0.176, 14.0.0.145, and 14.0.0.125.
20+
the ByteArray buffer. This module has been tested successfully on:
21+
* Windows 7 SP1 (32-bit), IE 8 to IE 11 and Flash 14.0.0.176, 14.0.0.145, and 14.0.0.125.
22+
* Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 14.0.0.179.
23+
* Windows 8.1, Firefox 38.0.5 and Adobe Flash 14.0.0.179.
2224
},
2325
'License' => MSF_LICENSE,
2426
'Author' =>

0 commit comments

Comments
 (0)