10
CVSSv2

CVE-2015-5119

Published: 08/07/2015 Updated: 20/01/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x up to and including 13.0.0.296 and 14.x up to and including 18.0.0.194 on Windows and OS X and 11.x up to and including 11.2.202.468 on Linux allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player 15.0.0.167

adobe flash_player 15.0.0.189

adobe flash_player 16.0.0.296

adobe flash_player 17.0.0.134

adobe flash_player 14.0.0.145

adobe flash_player 14.0.0.176

adobe flash_player 15.0.0.246

adobe flash_player 16.0.0.235

adobe flash_player 18.0.0.161

adobe flash_player 18.0.0.194

adobe flash_player 14.0.0.179

adobe flash_player 15.0.0.152

adobe flash_player 16.0.0.257

adobe flash_player 16.0.0.287

adobe flash_player

adobe flash_player 14.0.0.125

adobe flash_player 15.0.0.223

adobe flash_player 15.0.0.239

adobe flash_player 17.0.0.169

adobe flash_player 17.0.0.188

Vendor Advisories

Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13x through 1300296 and 14x through 1800194 on Windows and OS X and 11x through 112202468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash conte ...

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GoodRanking include Msf::Exploit::Remote::BrowserExploitServer def initialize(info={}) super(update_info(info, 'Name' ...
This Metasploit module exploits a use after free on Adobe Flash Player The vulnerability, discovered by Hacking Team and made public on its July 2015 data leak, was described as a Use After Free while handling ByteArray objects This Metasploit module has been tested successfully on: Windows 7 SP1 (32-bit), IE11 and Adobe Flash 1800194, Windows ...

Github Repositories

la repo verrà aggiornata in data 02/08/2023 ethical-hacking-proof Comandi Base Linux ls: Questo comando viene utilizzato per elencare i file e le directory nel tuo attuale percorso di lavoro Esempio: ls cd: Usato per cambiare la directory attuale Esempio: cd /home/user/Documents pwd: Stampa il percorso della directory di lavoro attuale Esempio: pwd cat: Util

Converted Metasploit exploits for Adobe Flash vulnerabilities CVE-2015-3090, CVE-2015-3105, CVE-2015-5119, and CVE-2015-5122 to a Python3 script.

Adobe Flash Exploits CVE-2015-3090, CVE-2015-3105, CVE-2015-5119, and CVE-2015-5122 Python3 Script Converted Metasploit exploits for Adobe Flash vulnerabilities CVE-2015-3090, CVE-2015-3105, CVE-2015-5119, and CVE-2015-5122 to a Python3 script Information This script will host a web server that can exploit one of the following Adobe Flash vulnerabilities at a time: CVE-2015-3

Converted Metasploit exploits for Adobe Flash vulnerabilities CVE-2015-3090, CVE-2015-3105, CVE-2015-5119, and CVE-2015-5122 to a Python3 script.

Adobe Flash Exploits CVE-2015-3090, CVE-2015-3105, CVE-2015-5119, and CVE-2015-5122 Python3 Script Converted Metasploit exploits for Adobe Flash vulnerabilities CVE-2015-3090, CVE-2015-3105, CVE-2015-5119, and CVE-2015-5122 to a Python3 script Information This script will host a web server that can exploit one of the following Adobe Flash vulnerabilities at a time: CVE-2015-3

CVE-2015-5119 A COOP like exploit

CVE Builder script that generates STIX formatted Exploit Target objects

Copyright (c) 2016 Crown Copyright (NCSC) Permission is hereby granted, free of charge, to use, copy, modify, merge, distribute and/or sub-licence the software together with any associated documentation provided that it is solely for your own internal use and subject to the following conditions: (1) The above copyright notice and this permission notice shall be included in all

Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough

CVE-2015-5119_walkthrough

Recent Articles

An overview of targeted attacks and APTs on Linux
Securelist • GReAT • 10 Sep 2020

Perhaps unsurprisingly, a lot has been written about targeted attacks on Windows systems. Windows is, due to its popularity, the platform for which we discover most APT attack tools. At the same time, there’s a widely held opinion that Linux is a secure-by-default operating system that isn’t susceptible to malicious code. It’s certainly true that Linux hasn’t faced the deluge of viruses, worms and Trojans faced by those running Windows systems over the years. However, there is certainly ...

BlackOasis APT and new targeted attacks leveraging zero-day exploit
Securelist • GReAT • 16 Oct 2017

More information about BlackOasis APT is available to customers of Kaspersky Intelligence Reporting Service. Contact: intelreports@kaspersky.com Kaspersky Lab has always worked closely with vendors to protect users. As soon as we find new vulnerabilities we immediately inform the vendor in a responsible manner and provide all the details required for a fix. On October 10, 2017, Kaspersky Lab’s advanced exploit prevention systems identified a new Adobe Flash zero day exploit used in the wild ag...

APT Trends report Q2 2017
Securelist • GReAT • 08 Aug 2017

Since 2014, Kaspersky Lab’s Global Research and Analysis Team (GReAT) has been providing threat intelligence reports to a wide-range of customers worldwide, leading to the delivery of a full and dedicated private reporting service. Prior to the new service offering, GReAT published research online for the general public in an effort to help combat the ever-increasing threat from nation-state and other advanced actors.  Since we began offering a threat intelligence service, all deep technical ...

Sundown exploit kit authors champions of copy-paste hacking
The Register • Darren Pauli • 05 Sep 2016

Pay peanuts, get monkeys.

Authors of the Sundown exploit kit have proven themselves masters of copy and paste, stealing exploits from rivals and borking encryption when they opt for originality. Exploit kits offer an arsenal of attacks to the unscrupulous and are popular because they offer many means to point malicious payloads at victim machines. Authors compete to build the most capable exploit kits by reverse-engineering patches to build in the latest exploits, by buying zero-day exploits on underground market or some...

Exploit kits throw Flash bash party, invite Crypt0l0cker, spam bots
The Register • Darren Pauli • 11 Jan 2016

Evilware rivals race to exploit the flaws stoopid folks don't fix

Criminals behind some of the most potent exploit kits, Neutrino and RIG, are ramping up attacks slinging the latest ransomware and hosing users who have not applied recent Adobe Flash patches. The patched vulnerabilities permit code execution and allow the dangerous hacking kits to compromise user machines. The two above-mentioned exploit kits jostle for top spot on the evilware charts, with speedy exploitation of Flash vulnerabilities giving one the edge over the other. Damage inflicted to indu...

Kaspersky Security Bulletin 2015. Top security stories
Securelist • David Emm Andrey Nikishin Alexander Gostev • 03 Dec 2015

Download PDF version Download EPUB Download Full Report PDF Download Full Report EPUB Targeted attacks are now an established part of the threat landscape, so it’s no surprise to see such attacks feature in our yearly review. Last year, in our security forecast, we outlined what we saw as the likely future APT developments. Here are the major APT campaigns that we reported this year. Carbanak combined cybercrime – in this case, stealing money from financial institutions – with the infil...

IT threat evolution in Q3 2015
Securelist • David Emm Maria Garnaeva Roman Unuchek Denis Makrushin Anton Ivanov • 02 Nov 2015

Download PDF version We’ve written about Turla several times over the last year or so (our initial report, follow-up analysis and campaign overview can be found on securelist.com). The group behind this cyber-espionage campaign has been active for more than eight years, infecting hundreds of computers in more than 45 countries. The organizations targeted include government agencies, embassies, military, education, research and pharmaceutical companies. The Turla group profiles its victims, usi...

New activity of the Blue Termite APT
Securelist • Suguru Ishimaru • 20 Aug 2015

In October 2014, Kaspersky Lab started to research “Blue Termite”, an Advanced Persistent Threat (APT) targeting Japan. The oldest sample we’ve seen up to now is from November 2013. This is not the first time the country has been a victim of an APT. However, the attack is different in two respects: unlike other APTs, the main focus of Blue Termite is to attack Japanese organizations; and most of their C2s are located in Japan. One of the top targets is the Japan Pension Service, but the li...

Hacking Team Flash exploit leak revealed lightning reflexes of malware toolkit crafters
The Register • Iain Thomson in San Francisco • 05 Aug 2015

Less than 24 hours from release to attack

Black Hat 2015 When the Italian surveillanceware maker Hacking Team got hacked last month, the intruders unwittingly set the groundwork for a very interesting research project. Tracking the time from a vulnerability being found in some software to seeing it exploited in the wild is tricky – malware writers don't often publicize their releases. But when 400GB of swiped Hacking Team files were dumped online the vulnerabilities the biz was exploiting to infect PCs were open for all to see. The fi...

The roots go deep: Kill Adobe Flash, kill it everywhere, bod says
The Register • Darren Pauli • 21 Jul 2015

Even after deletion you can be p0wned by PowerPoint or whipped by Word

Fortinet security researcher Bing Lui has warned users that they can still be p0wned if they only disable Adobe Flash in web browsers. Lui's warning speaks to advice last week that users dump Flash to bolster security in the wake of the public disclosure of three zero day vulnerabilities (CVE-2015-5122. CVE-2015-5123, and CVE-2015-5119 ) as part of the Hacking Team cyber defiling. He built an exploit against the first vuln in demonstrating how the likely common mistake of uninstalling Flash only...

Crims bait phishing hooks with Flash, cast at US Gov agencies
The Register • Darren Pauli • 20 Jul 2015

State targeted after tech, aerospace, transport campaign

Hackers are attempting to break into US Government agencies using a recently patched Adobe Flash vulnerability, the FBI is warning. The attacks target flaw CVE-2015-5119 revealed and patched earlier this month that can if exploited allow attackers to run malware on victim machines. The agency warned of the attacks which began 8 July in a memo (alert A-000062-PH) CSO reported. "The FBI has received information regarding a likely ongoing phishing campaign that started 08 July 2015 and was observed...

Flash HOLED AGAIN TWICE below waterline in fresh Hacking Team reveals
The Register • Chris Williams, Editor in Chief • 12 Jul 2015

Adobe vows to plug serious hijack leaks

Updated Two more serious Adobe Flash vulnerabilities have emerged from the leaked Hacking Team files, ones which allow malefactors to take over computers remotely – and crooks are apparently already exploiting at least one of them to infect machines. The use-after-free() programming flaws, for which no patches exist, are identified as CVE-2015-5122 and CVE-2015-5123. They are similar to the CVE-2015-5119 Flash bug patched last week. The 5122 and 5123 bugs let malicious Flash files execute code...

Decision time: Uninstall Adobe Flash or install yet another critical patch
The Register • Shaun Nichols in San Francisco • 08 Jul 2015

Hacking Team vulnerability fixed for Windows, OS X and Linux machines

Adobe has issued yet another update for Flash Player to patch a critical vulnerability revealed in documents leaked from spyware maker Hacking Team. The update patches 36 CVE-listed flaws, including the hacking Team's CVE-2015-5119 bug – which can be exploited by a malicious Flash file to run malware on a victim's system. Some of the other 35 programming cockups also allow hackers to pull off remote-code execution attacks on vulnerable computers. Users of Flash Player for Windows, OS X, and Li...