Fortinet Discovers Adobe Flash Player MP4 Handling Memory Corruption Vulnerability
Fortinet's FortiGuard Labs has discovered a memory corruption vulnerability in Adobe Flash Player.
Adobe Flash Player is free software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio. Flash Player can run from a web browser as a browser plug-in or on supported mobile devices. Flash Player has a wide user base, and is a common format for games, animations, and graphical user interfaces (GUIs) embedded in web pages. Adobe states that more than 400 million out of over 1 billion connected desktops update to the new version of Flash Player within six weeks of release.
A memory corruption vulnerability has been discovered in Flash Player when processing MP4 files. The vulnerability can be triggered by a specifically crafted MP4 file with crafted sample size in MP4 atom specification which causes an out of bounds memory access. Attackers can exploit the vulnerability by using the out of bounds access for unintended reads, writes or frees -- potentially leading to code corruption, control-flow hijack, or information leak attack.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Jan 05, 2017
Users should apply the solution provided by Adobe.
The affected Flash Player versions are 184.108.40.206 and earlier.
The vulnerability is fixed in Flash Player version 220.127.116.11.
This vulnerability was discovered by Kai Lu of Fortinet's FortiGuard Labs.