[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAHCxs98PZepqGytZPZzJZPtg=TUocXsTuKcP=mo6j5d=0ik2FQ@mail.gmail.com>
Date: Mon, 9 Apr 2012 07:39:17 -0700
From: Fermín J. Serna <fjserna@...il.com>
To: dailydave@...ts.immunityinc.com, bugtraq@...urityfocus.com,
full-disclosure@...ts.grok.org.uk
Subject: CVE-2012-0769, the case of the perfect info leak
Hi,
During the last few months I have been researching Adobe's Flash
vulnerabilities ranging from type confusion vulnerabilities, AS3 API
vulnerabilities (CVE-2012-0769), sandbox escapes (CVE-2012-0724 &
CVE-2012-0725), etc.
I am pleased to announce the release of part of this research. In this
case, the below linked document will focus on an already patched
(https://www.adobe.com/support/security/bulletins/apsb12-05.html)
vulnerability. "CVE-2012-0769, the case of the perfect info leak" goes
in detail from root cause analysis to a fully reliable, quick and
multi-platform exploitation of the vulnerability.
Document: http://zhodiac.hispahack.com/my-stuff/security/Flash_ASLR_bypass.pdf
Source code: http://zhodiac.hispahack.com/my-stuff/security/InfoLeak.as
SWF file: http://zhodiac.hispahack.com/my-stuff/security/InfoLeak.swf
Enjoy,
---
Fermín J. Serna
Web & Blog: http://zhodiac.hispahack.com
Pgp key: http://zhodiac.hispahack.com/gpg/zhodiac.asc
Twitter: @fjserna
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists