Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-5119 PoC — Adobe Flash Player ActionScript 3 缓冲区溢出漏洞

Source
Associated Vulnerability
Title:Adobe Flash Player ActionScript 3 缓冲区溢出漏洞 (CVE-2015-5119)
Description:Adobe Flash Player是美国奥多比(Adobe)公司的一款跨平台、基于浏览器的多媒体播放器产品。该产品支持跨屏幕和浏览器查看应用程序、内容和视频。ActionScript 3(AS3)是Adobe为其Flash产品开发的一种面向对象的编程语言。 Adobe Flash Player的AS3实现过程中的‘ByteArray’类存在释放后重用漏洞。远程攻击者可借助覆盖ValueOf函数的Flash内容利用该漏洞执行任意代码,或造成拒绝服务(内存损坏)。以下版本受到影响:基于Windows和OS
Readme
# CVE-2015-5119

A COOP like exploit

![alt text](https://github.com/dangokyo/CVE-2015-5119/blob/master/20180820001.png)

File Snapshot

[4.0K] /data/pocs/f479218a0dfdf1939efeaf149255f8ebeb81d7ea ├── [200K] 20180820001.png ├── [4.0K] bin │   ├── [5.1K] CVE-2015-5119.swf │   ├── [ 773] expressInstall.swf │   ├── [ 885] index.html │   └── [4.0K] js │   └── [10.0K] swfobject.js ├── [ 122] README.md └── [4.0K] src ├── [ 420] Address64.as ├── [9.9K] Exploiter64.as ├── [ 569] Logger.as ├── [ 412] Main.as ├── [ 186] MyClass1.as ├── [ 10K] MyClass2.as └── [1.8K] MyClass.as 3 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.