Fortinet Discovers Adobe Flash Player ATF Handling Heap Overflow Vulnerability
Summary
Fortinet's FortiGuard Labs has discovered a heap overflow vulnerability in Adobe Flash Player.
Adobe Flash Player is free software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio. Flash Player can run from a web browser as a browser plug-in or on supported mobile devices. Flash Player has a wide user base, and is a common format for games, animations, and graphical user interfaces (GUIs) embedded in web pages. Adobe states that more than 400 million out of over 1 billion connected desktops update to the new version of Flash Player within six weeks of release.
A heap overflow vulnerability has been discovered in Flash Player when processing Adobe Texture Format (ATF). The vulnerability can be triggered by a specifically crafted ATF file which causes an out of bounds memory access, due to improper bounds checking when manipulating a pointer to a heap allocated buffer. Attackers can exploit the vulnerability by using the out of bounds access for unintended reads, writes or frees -- potentially leading to code corruption, control-flow hijack, or information leak attack.
Solutions
FortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:Adobe.Flash.Adobe.Texture.Format.Heap.Overflow
Released Jan 06, 2017
Users should apply the solution provided by Adobe.
Additional Information
The affected Flash Player versions are 24.0.0.186 and earlier.
The vulnerability is fixed in Flash Player version 24.0.0.194.