Fortinet Discovers Adobe Flash Player MP4 dref Tag Handling Memory Corruption Vulnerability
Summary
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Adobe Flash Player.
Adobe Flash Player is free software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio. Flash Player can run from a web browser as a browser plug-in or on supported mobile devices. Flash Player has a wide user base, and is a common format for games, animations, and graphical user interfaces (GUIs) embedded in web pages. Adobe states that more than 400 million out of over 1 billion connected desktops update to the new version of Flash Player within six weeks of release.
A memory corruption vulnerability has been discovered in Flash Player h264 decompression routine. The vulnerability can be triggered by a specifically crafted MP4 file with malformed 'dref' tag and sample size associated with 'stsz' tag, which causes an out of bounds memory access. Attackers can exploit the vulnerability for unintended reads, writes or frees which could potentially lead to code corruption, control-flow hijack, or information leak attack.
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:Adobe.Flash.MP4.H264.Decompression.Memory.Corruption
Released Feb 10, 2017
Users should apply the solution provided by Adobe.