Fortinet Discovers Adobe Flash Player ATF Handling Heap Overflow Vulnerability
Fortinet's FortiGuard Labs has discovered a heap overflow vulnerability in Adobe Flash Player.
Adobe Flash Player is free software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio. Flash Player can run from a web browser as a browser plug-in or on supported mobile devices. Flash Player has a wide user base, and is a common format for games, animations, and graphical user interfaces (GUIs) embedded in web pages. Adobe states that more than 400 million out of over 1 billion connected desktops update to the new version of Flash Player within six weeks of release.
A heap overflow vulnerability has been discovered in Flash Player when processing Adobe Texture Format (ATF). The vulnerability can be triggered by a specifically crafted ATF file which causes an out of bounds memory access, due to improper bounds checking when manipulating a pointer to a heap allocated buffer. Attackers can exploit the vulnerability by using the out of bounds access for unintended reads, writes or frees -- potentially leading to code corruption, control-flow hijack, or information leak attack.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Jan 06, 2017
Users should apply the solution provided by Adobe.
The affected Flash Player versions are 220.127.116.11 and earlier.
The vulnerability is fixed in Flash Player version 18.104.22.168.
This vulnerability was discovered by Kai Lu of Fortinet's FortiGuard Labs.