Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-5119 PoC — Adobe Flash Player ActionScript 3 缓冲区溢出漏洞

Source
Associated Vulnerability
Title:Adobe Flash Player ActionScript 3 缓冲区溢出漏洞 (CVE-2015-5119)
Description:Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。ActionScript 3(AS3)是Adobe为其Flash产品开发的一种面向对象的编程语言。 Adobe Flash Player的AS3实现过程中的‘ByteArray’类存在释放后重用漏洞。远程攻击者可借助覆盖ValueOf函数的Flash内容利用该漏洞执行任意代码,或造成拒绝服务(内存损坏)。以下版本受到影响:基于Windows和OS
File Snapshot

[4.0K] /data/pocs/932c9a8bd30d3034eda9a022eb53a0c10b6e4d83 ├── [4.0K] bin │   ├── [ 773] expressInstall.swf │   ├── [ 884] index.html │   └── [4.0K] js │   └── [10.0K] swfobject.js ├── [2.9K] CVE-2015-5119.as3proj ├── [4.0K] obj │   ├── [1.6K] CVE-2015-5119Config.old │   └── [1.6K] CVE-2015-5119Config.xml └── [4.0K] src ├── [ 436] Address64.as ├── [7.2K] Elf.as ├── [1.0K] Exploit.as ├── [2.3K] ExploitByteArray.as ├── [ 10K] Exploiter64.as ├── [ 15K] Exploiter.as ├── [1.7K] ExploitVector.as ├── [ 721] Logger.as ├── [ 146] MyClass1.as ├── [ 10K] MyClass2.as ├── [2.7K] MyClass.as ├── [2.9K] PE64.as └── [2.5K] PE.as 4 directories, 19 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.