Fortinet Discovers Adobe Flash Player MP4 Image Resolution Handling Heap Overflow Vulnerability II
Fortinet's FortiGuard Labs has discovered a heap overflow vulnerability in Adobe Flash Player.
Adobe Flash Player is free software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio. Flash Player can run from a web browser as a browser plug-in or on supported mobile devices. Flash Player has a wide user base, and is a common format for games, animations, and graphical user interfaces (GUIs) embedded in web pages. Adobe states that more than 400 million out of over 1 billion connected desktops update to the new version of Flash Player within six weeks of release.
An instance of a heap overflow vulnerability has been discovered in Flash Player h264 decoder routine. The vulnerability can be triggered by a specifically crafted MP4 file with image resolution smaller than specified, which causes an out of bounds memory access. Attackers can exploit the vulnerability for unintended reads, writes or frees which could potentially lead to code corruption, control-flow hijack, or information leak attack.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Feb 10, 2017
Users should apply the solution provided by Adobe.
This vulnerability was discovered by Kai Lu of Fortinet's FortiGuard Labs