10
CVSSv2

CVE-2015-3043

Published: 14/04/2015 Updated: 30/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Adobe Flash Player prior to 13.0.0.281 and 14.x up to and including 17.x prior to 17.0.0.169 on Windows and OS X and prior to 11.2.202.457 on Linux allows malicious users to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player

adobe flash_player 14.0.0.125

adobe flash_player 15.0.0.223

adobe flash_player 15.0.0.239

adobe flash_player 15.0.0.246

adobe flash_player 14.0.0.179

adobe flash_player 15.0.0.152

adobe flash_player 16.0.0.287

adobe flash_player 16.0.0.296

adobe flash_player 15.0.0.167

adobe flash_player 15.0.0.189

adobe flash_player 17.0.0.134

adobe flash_player 14.0.0.145

adobe flash_player 14.0.0.176

adobe flash_player 16.0.0.235

adobe flash_player 16.0.0.257

novell suse linux enterprise desktop 12.0

opensuse opensuse 13.2

opensuse opensuse 13.1

novell suse linux enterprise desktop 11.0

novell suse linux enterprise workstation extension 12.0

redhat enterprise linux server supplementary 6.0

redhat enterprise linux workstation supplementary 6.0

redhat enterprise linux desktop supplementary 5.0

redhat enterprise linux desktop supplementary 6.0

redhat enterprise linux server supplementary eus 6.6.z

redhat enterprise linux supplementary 5.0

Vendor Advisories

Adobe Flash Player before 1300281 and 14x through 17x before 1700169 on Windows and OS X and before 112202457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CV ...

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::BrowserExploitServer def initialize(info={}) super(update_info(info, 'Name' ...
This Metasploit module exploits a buffer overflow on Adobe Flash Player when handling nellymoser encoded audio inside a FLV video, as exploited in the wild on June 2015 This Metasploit module has been tested successfully on: Windows 7 SP1 (32-bit), IE11 and Adobe Flash 1800160, Windows 7 SP1 (32-bit), Firefox 3805 and Adobe Flash 1800160, ...
This module exploits a buffer overflow on Adobe Flash Player when handling nellymoser encoded audio inside a FLV video, as exploited in the wild on June 2015 This module has been tested successfully on: Windows 7 SP1 (32-bit), IE11 and Adobe Flash 1800160, Windows 7 SP1 (32-bit), Firefox 3805 and Adobe Flash 1 ...
This module exploits a buffer overflow on Adobe Flash Player when handling nellymoser encoded audio inside a FLV video, as exploited in the wild on June 2015 This module has been tested successfully on: Windows 7 SP1 (32-bit), IE11 and Adobe Flash 1800160, Windows 7 SP1 (32-bit), Firefox 3805 and Adobe Flash 1 ...

Metasploit Modules

Adobe Flash Player Nellymoser Audio Decoding Buffer Overflow

This module exploits a buffer overflow on Adobe Flash Player when handling nellymoser encoded audio inside a FLV video, as exploited in the wild on June 2015. This module has been tested successfully on: Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.160, Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.160, Windows 8.1, Firefox 38.0.5 and Adobe Flash 18.0.0.160, Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.466, and Ubuntu 14.04.2 LTS, Firefox 35.01, and Adobe Flash 11.2.202.466. Note that this exploit is effective against both CVE-2015-3113 and the earlier CVE-2015-3043, since CVE-2015-3113 is effectively a regression to the same root cause as CVE-2015-3043.

msf > use exploit/multi/browser/adobe_flash_nellymoser_bof
msf exploit(adobe_flash_nellymoser_bof) > show targets
    ...targets...
msf exploit(adobe_flash_nellymoser_bof) > set TARGET < target-id >
msf exploit(adobe_flash_nellymoser_bof) > show options
    ...show and set options...
msf exploit(adobe_flash_nellymoser_bof) > exploit
Adobe Flash Player Nellymoser Audio Decoding Buffer Overflow

This module exploits a buffer overflow on Adobe Flash Player when handling nellymoser encoded audio inside a FLV video, as exploited in the wild on June 2015. This module has been tested successfully on: Windows 7 SP1 (32-bit), IE11 and Adobe Flash 18.0.0.160, Windows 7 SP1 (32-bit), Firefox 38.0.5 and Adobe Flash 18.0.0.160, Windows 8.1, Firefox 38.0.5 and Adobe Flash 18.0.0.160, Linux Mint "Rebecca" (32 bits), Firefox 33.0 and Adobe Flash 11.2.202.466, and Ubuntu 14.04.2 LTS, Firefox 35.01, and Adobe Flash 11.2.202.466. Note that this exploit is effective against both CVE-2015-3113 and the earlier CVE-2015-3043, since CVE-2015-3113 is effectively a regression to the same root cause as CVE-2015-3043.

msf > use exploit/multi/browser/adobe_flash_nellymoser_bof
msf exploit(adobe_flash_nellymoser_bof) > show targets
    ...targets...
msf exploit(adobe_flash_nellymoser_bof) > set TARGET < target-id >
msf exploit(adobe_flash_nellymoser_bof) > show options
    ...show and set options...
msf exploit(adobe_flash_nellymoser_bof) > exploit

Recent Articles

Kremlin hackers exploited TWO 0-day Flash, Windows vulns
The Register • John Leyden • 20 Apr 2015

Operation RussianDoll smelled like Russian miscreants, say infosec bods

A hacking group probably backed by Russia has been making use of two zero-day exploits to target foreign governments. The so-called "Operation RussianDoll" attackers used zero-day exploits in Adobe Flash and Windows to target a specific foreign government organisation. Security firm FireEye says the pattern of the attacks fits those of the recently exposed APT 28 cyberspies, making the group the most likely culprits for the latest attack. The highly complex attack featuring used two zero-days to...

It's 2015 and a RICH TEXT FILE or a HTTP request can own your Windows machine
The Register • Shaun Nichols in San Francisco • 15 Apr 2015

Patch now before someone writes exploits for these bugs

Microsoft has delivered its latest monthly batch of security updates to address flaws in Windows, Office and Internet Explorer. Redmond's latest Patch Tuesday payload includes 11 bulletins, four of which are rated critical as they allow attackers to execute malicious code on victims' computers from across the internet. The full list is as follows: Microsoft thanks those who reported the aforementioned programming blunders, right here. One of the security updates for Internet Explorer 11 also dis...