10
CVSSv2

CVE-2015-0311

Published: 23/01/2015 Updated: 14/02/2015
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in Adobe Flash Player up to and including 13.0.0.262 and 14.x, 15.x, and 16.x up to and including 16.0.0.287 on Windows and OS X and up to and including 11.2.202.438 on Linux allows remote malicious users to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player

adobe flash_player 15.0.0.246

adobe flash_player 15.0.0.239

adobe flash_player 15.0.0.152

adobe flash_player 14.0.0.179

adobe flash_player 14.0.0.176

adobe flash_player 14.0.0.145

adobe flash_player 16.0.0.257

adobe flash_player 16.0.0.287

adobe flash_player 16.0.0.235

adobe flash_player 14.0.0.125

adobe flash_player 15.0.0.167

adobe flash_player 15.0.0.223

adobe flash_player 15.0.0.189

Vendor Advisories

Synopsis Critical: flash-plugin security update Type/Severity Security Advisory: Critical Topic An updated Adobe Flash Player package that fixes multiple security issuesis now available for Red Hat Enterprise Linux 5 and 6 SupplementaryRed Hat Product Security has rated this update as having Critical secur ...
Unspecified vulnerability in Adobe Flash Player through 1300262 and 14x, 15x, and 16x through 1600287 on Windows and OS X and through 112202438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015 ...

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Powershell include Msf::Exploit::Remote::BrowserExploitServer def initialize(info={}) super ...
This Metasploit module exploits an use after free vulnerability in Adobe Flash Player The vulnerability occurs in the ByteArray::UncompressViaZlibVariant method, when trying to uncompress() a malformed byte stream This Metasploit module has been tested successfully on Windows 7 SP1 (32 bits), IE 8 to IE 11 and Flash 1600287, 1600257 and 16 ...

Github Repositories

Reupload of an old Linux/Firefox port of an exploit for CVE-2015-0311 (Use-after-free in Adobe Flash Player) I created for educational purposes

Recent Articles

NINETY PER CENT of Java black hats migrate to footling Flash
The Register • Darren Pauli • 27 Apr 2015

Patch-or-die policy makes net scum move on to softer target

RSA 2015 Almost every Java-hacking black hat is now popping Adobe Flash, after Microsoft's hard-line patch policy made it harder to target software such as Java. The stricken scum now face a choice: work harder to find Java zero-days or abandon ship and start exploiting old Flash bugs. Redmond's security brains trust – Tim Rains, Matt Miller, and David Watson – say its patch wrecking ball, applied only to out-of-date Java installations last year, forced 90 per cent of that platform's hackers...

Fake Pirate Bay site pushes banking Trojan to WordPress users
The Register • John Leyden • 01 Apr 2015

Pirated pirate site springs 'You've been iFramed' drive-by surprise

Multiple WordPress sites are being redirected to a Pirate Bay copycat which in turn was being used to sling malware, anti-malware firm Malwarebytes warns. Several WordPress sites were injected with the same iframe over the last few days as part of an attack ultimately geared towards serving content from sites such as thepiratebay(dot)in(dot)ua. This is not the officially maintained Pirate Bay mirror site, but rather a clone set up through The Open Bay project by hackers rather than file sharers...

Gamers! Ransomware will scramble your save files unless you cough up $1,000
The Register • Iain Thomson in San Francisco • 13 Mar 2015

Actually, it's about ethics in data kidnapping

Researchers have spotted malware that targets gamers, and threatens to trash their in-game progress unless they pay up. The software nasty, dubbed Teslacrypt, works in the same way as traditional ransomware like Cryptolocker. It attempts to infect Windows PCs by exploiting a vulnerability in Adobe Flash (CVE-2015-0311) or Internet Explorer (CVE-2013-2551). A victim has to visit a booby-trapped website to get infected, although the malware backs off if it detects the presence of some antivirus pa...

Jamie Oliver serves up steaming pile of malware
The Register • Darren Pauli • 18 Feb 2015

Hacker recipe: a dash of Flash, a sprinkle of Silverlight, a pinch of Java and YOU'RE DONE

Tousle-haired celebrity chef Jamie Oliver has served up a stomach-churning exploit kit to those who visit his web site. His eponymous .com site, ranked 519 in the UK and drawing some 10 million visitors a month was compromised to plate-up the foul-tasting Fiesta exploit kit to compromise user machines. Malwarebytes senior researcher Jérôme Segura said crook cooks orchestrated a "carefully and well hidden" attack and hid an iframe URL with base-64 encoding. "The web masters will need to look fo...

Biter bitten as hacker leaks source code for popular exploit kit
The Register • Darren Pauli • 13 Feb 2015

There is no honour among thieves

A black hat trouble maker appears to have released recent source code for one of the most popular exploit kits, malware-probers say. The dump was posted online by a user known as (@EkMustDie) before it was removed. The leaker appears to have previously tried to sell access to the exploit kit. Independent malware investigators including UK hacker known as MalwareTech (@MalwareTechBlog) and French bod Kaffeine (@kafeine) discovered the source code being slung on HackForums by the apparent former r...

Attackers sling recent Flash 0day through 1800 domains
The Register • Darren Pauli • 04 Feb 2015

Nuke it from orbit. It's the only way to be sure

Some 1800 subdomains have been found slinging the Angler exploit kit using Adobe's most recent Flash zero day exploit, Cisco researcher Nick Biasini says. The lion's share of nasty subdomains were set up on 28 and 29 January and tied to about 50 GoDaddy registrant accounts. Biasini said the malvertising attacks used several layers of subdomains to avoid detection. "Researchers detected the new campaign when referencing a known hash that was delivering the recent Flash zero day (CVE-2015-0311)," ...

Another day, yet another emergency Adobe Flash patch. Because that's how we live now
The Register • Iain Thomson in San Francisco • 27 Jan 2015

Update your plugin now before someone pwns your PC

The new year hasn't been a pleasant one for Adobe: the Silicon Valley firm has scrambled to close yet more serious security holes in its Flash player. Last week the Photoshop biz rushed out a patch for a critical flaw in Flash that miscreants were exploiting in the wild to hijack victims' computers. Today, a new update has been pushed out to deal with two critical flaws: CVE-2015-0311 and CVE-2015-0312. The former was discovered by French malware researcher Kafeine, and the latter by someone cal...