lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 9 Apr 2012 07:39:17 -0700
From: Fermín J. Serna <fjserna@...il.com>
To: dailydave@...ts.immunityinc.com, bugtraq@...urityfocus.com, 
	full-disclosure@...ts.grok.org.uk
Subject: CVE-2012-0769, the case of the perfect info leak

Hi,

During the last few months I have been researching Adobe's Flash
vulnerabilities ranging from type confusion vulnerabilities, AS3 API
vulnerabilities (CVE-2012-0769), sandbox escapes (CVE-2012-0724 &
CVE-2012-0725), etc.

I am pleased to announce the release of part of this research. In this
case, the below linked document will focus on an already patched
(https://www.adobe.com/support/security/bulletins/apsb12-05.html)
vulnerability. "CVE-2012-0769, the case of the perfect info leak" goes
in detail from root cause analysis to a fully reliable, quick and
multi-platform exploitation of the vulnerability.

Document: http://zhodiac.hispahack.com/my-stuff/security/Flash_ASLR_bypass.pdf
Source code: http://zhodiac.hispahack.com/my-stuff/security/InfoLeak.as
SWF file: http://zhodiac.hispahack.com/my-stuff/security/InfoLeak.swf

Enjoy,

---
Fermín J. Serna

Web & Blog: http://zhodiac.hispahack.com
Pgp key: http://zhodiac.hispahack.com/gpg/zhodiac.asc
Twitter: @fjserna

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists