Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to analyze vulnerabilities in the execution of arbitrary commands in Adobe Flash

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/01 Report--

How to carry out Adobe Flash arbitrary command execution vulnerability analysis, many novices are not very clear about this, in order to help you solve this problem, the following editor will explain for you in detail, people with this need can come to learn, I hope you can gain something.

0x00 event description

On October 16, 2017, Adobe issued an emergency security bulletin (serial number: APSB17-32), which disclosed that a Flash vulnerability (CVE-2017-11292) had been fixed. This vulnerability affects the whole platform and does great harm, resulting in the execution of arbitrary commands on the user's system, and the user's system control can be obtained by hanging up the horse. Recently, a copy captured by Kaspersky uses Flash

Field exploitation samples of 0day have been confirmed to have used this vulnerability.

0x01 affected version

Description of wild exploitation of 0x02 vulnerabilities

On October 10, 2017, Kaspersky Lab identified a new Adobe Flash0day vulnerability using the prevention system.

Exploits are spread through Microsoft Office documents, and dozens of similar new attacks have been discovered during sample tracking.

The bait files used in these attacks are as follows:

Send Office document by mail, embed an ActiveX object containing Flash vulnerability in the document, damage memory through type confusion, gain arbitrary read and write operation permission of memory, and release Payload.

0x03 security recommendations

The manufacturer Adobe has issued a corresponding notice and a new version of the software. 360CERT suggests that the extensive use of Flash should be checked and upgraded as soon as possible. Disable the Flash plug-in for network quarantined users.

Is it helpful for you to read the above content? If you want to know more about the relevant knowledge or read more related articles, please follow the industry information channel, thank you for your support.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report