9.8
CVSSv3

CVE-2018-4878

Published: 06/02/2018 Updated: 18/04/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 676
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A use-after-free vulnerability exists in Adobe Flash Player prior to 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe flash_player

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

redhat enterprise linux desktop 6.0

Vendor Advisories

Synopsis Critical: flash-plugin security update Type/Severity Security Advisory: Critical Topic An update for flash-plugin is now available for Red Hat Enterprise Linux 6 SupplementaryRed Hat Product Security has rated this update as having a security impact of Critical A Common Vulnerability Scoring Syst ...
A use-after-free vulnerability was discovered in Adobe Flash Player before 2800161 This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects A successful attack can lead to arbitrary code execution This was exploited in the wild in January and February 2018 ...

Exploits

Adobe Flash versions 2800137 and below remote code execution proof of concept exploit ...

Github Repositories

[BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack

EKTotal EKTotal is an integrated analysis tool that can automatically analyze the traffic of Drive-by Download attacks The proposed software package can identify four types of Exploit Kits such as RIG and Magnitude, and more than ten types of attack campaigns such as Seamless and Fobos EKTotal can also extract exploit codes and malware The proposed heuristic analysis engine

Metasploit module for CVE-2018-4878

Metasploit module for CVE-2018-4878 The SWF file is based on the PoC by Michael Gorelik Copy CVE-2018-4878swf to data/exploits

CobaltStrike优秀资源

《神器CobaltStrike》 这里记录收集一些优秀的CobaltStrike资源。这些项目大部分都未检测是否存在后门,请务必在虚拟机里面运行。 部分Scripts在CobaltStrike40以下无法运行,本项目只考虑兼容CobaltStrike40。但是抱着学习的态度,对于一些优秀的Scripts即使无法兼容40也会进行收集整理。CobaltStri

APT_REPORT collected by @blackorbird twittercom/blackorbird Interesting apt report & sample & malware & technology & intellegence collection APT Group for country Sample Group123 ▶ScarCruft continues to evolve, introduces Bluetooth harvester securelistcom/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/ (May

Cobaltstrike扩展插件整理,仅作记录,原文不是我

原文:mpweixinqqcom/s/bx2OMVPoUH4B7THZqq11Uw 原文:mpweixinqqcom/s/bx2OMVPoUH4B7THZqq11Uw 原文:mpweixinqqcom/s/bx2OMVPoUH4B7THZqq11Uw githubcom/harleyQu1nn/AggressorScripts githubcom/bluscreenofjeff/AggressorScripts githubcom/michalkoczwara/aggressor_scripts_collection githubcom/vysecurity/Aggressor-VYSEC

Aggressor Script to just launch IE driveby for CVE-2018-4878

Author and Credits Author: Vincent Yiu (@vysecurity) Credits: @evi1cg: Helping me test and keep me motivated @smgoreli: Original Calcexe PoC Disclaimer Developed to encourage more Aggressor script development Use only in authorized penetration testing! Description Aggressor Script to launch an Internet Explorer driveby attack using CVE-2018-4878 exploit for Shockwave Flash

Aggressor Script to launch IE driveby for CVE-2018-4878

Author and Credits Author: Vincent Yiu (@vysecurity) Credits: @evi1cg: Helping me test and keep me motivated @smgoreli: Original Calcexe PoC @kbandla: He knows, and I know ;) Disclaimer Developed to encourage more Aggressor script development Use only in authorized penetration testing! Description Aggressor Script to launch an Internet Explorer driveby attack using CVE-201

malware-samples A collection of malware samples and relevant dissection information, most probably referenced from bloginquestnet or twittercom/inquest Be sure to also check out the Deep File Inspection (DFI) portion of labsinquestnet for an interactive searchable interface to a large corpus (>500K) of downloadable malware lures CVE-2018-48

CobaltStrike资源大全

《深入理解Cobalt Strike》 这里记录收集优秀的CobaltStrike内容,包括优秀的资源工具或优秀的项目代码等。本项目大部分工具都未检测是否存在后门,务必在虚拟机下运行。CobaltStrike思想是攻击者的进步。作者:0e0w 本项目创建时间为2021年8月3日。最近的一次更新时间为2023年8月4日。 01-Coba

Cobaltstrike扩展插件整理,仅作记录,原文不是我

原文:mpweixinqqcom/s/bx2OMVPoUH4B7THZqq11Uw 原文:mpweixinqqcom/s/bx2OMVPoUH4B7THZqq11Uw 原文:mpweixinqqcom/s/bx2OMVPoUH4B7THZqq11Uw githubcom/harleyQu1nn/AggressorScripts githubcom/bluscreenofjeff/AggressorScripts githubcom/michalkoczwara/aggressor_scripts_collection githubcom/vysecurity/Aggressor-VYSEC

OpenSource Assignment 3 Sejong University 17011620 Jeong Jaewoo I edited this source code to work it in my local environment When training malware data set, I used this file When testing malware or not, I used CVE-2018-4878 exploit PE Malware and calcexe Train $ python learningpy Researching important feature based on 54 total features /usr/local/lib/python27/dist-packa

Aggressor Script to launch IE driveby for CVE-2018-4878

Author and Credits Author: Vincent Yiu (@vysecurity) Credits: @evi1cg: Helping me test and keep me motivated @smgoreli: Original Calcexe PoC @kbandla: He knows, and I know ;) Disclaimer Developed to encourage more Aggressor script development Use only in authorized penetration testing! Description Aggressor Script to launch an Internet Explorer driveby attack using CVE-201

APT_REPORT collected by @blackorbird twittercom/blackorbird Interesting apt report collection Group123 ▶ group123 APT organization, 'Operation High Expert' blogalyaccokr/2226 (April 2 , 2019) ▶ Rocketman APT Campaign Returned to Operation Holiday Wiper blogalyaccokr/2089 (Jan 23, 2019) ▶ 'Operation Blackbird', the mobile

This is a list of offensive security tools that I have curated and actaully saved..

List-O-Tools This is a list of offensive security tools that I have curated and actaully saved githubcom/751643992/whale githubcom/751643992/LittleCCompiler githubcom/751643992/shellcode githubcom/odzhan/acorn githubcom/odzhan/injection githubcom/odzhan/dewifi githubcom/odzhan/polymutex githubcom/TonyChen

《深入理解Cobalt Strike》 这里记录收集优秀的CobaltStrike内容,包括优秀的资源工具或优秀的项目代码等。本项目大部分工具都未检测是否存在后门,务必在虚拟机下运行。CobaltStrike思想是攻击者的进步。作者:0e0w 本项目创建时间为2021年8月3日。最近的一次更新时间为2022年7月18日。 01-Coba

《深入理解Cobalt Strike》 这里记录收集优秀的CobaltStrike内容,包括优秀的资源工具或优秀的项目代码等。本项目大部分工具都未检测是否存在后门,务必在虚拟机下运行。CobaltStrike思想是攻击者的进步。作者:0e0w 本项目创建时间为2021年8月3日。最近的一次更新时间为2022年7月18日。 01-Coba

APT_REPORT collected by @blackorbird twittercom/blackorbird Interesting apt report collection APT Group for country Group123 ▶ScarCruft continues to evolve, introduces Bluetooth harvester securelistcom/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/ (May 13, 2019) ▶Group123 Attempts to attack 'printing paper' APT disguised as

Flash Exploit Poc

CVE-2018-4878 Flash Exploit Poc ' quick and dirty' For more in-depth info blogtalosintelligencecom/2018/02/group-123-goes-wildhtml Original Poc githubcom/anbai-inc/CVE-2018-4878 in this repo, I fixed the crash issue, and calculate the right space for the shellcode, check the exploit for more details twitter: @SyFi2k

软件系统安全结课作业:[漏洞复现] CVE-2018-4878 Flash 0day

SoftwareSystemSecurity-2019 软件系统安全结课作业:[漏洞复现] CVE-2018-4878 Flash 0day

软件系统与安全2019大作业提交 选题:[漏洞复现] CVE-2018-4878 Flash 0day

A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.

yara-rules A collection of YARA rules from the folks at InQuest we wish to share with the world These rules should not be considered production appropriate Rather, they are valuable for research and hunting purposes See also: githubcom/InQuest/yara-rules-vt 📖 githubcom/InQuest/awesome-yara 🏆🥇 labsinquestnet 🥼🔬🧪 yaramatec

Interesting APT Report Collection And Some Special IOC

APT_REPORT collected by @blackorbird twittercom/blackorbird Interesting apt report & sample & malware & technology & intellegence collection APT Group for country Sample Group123 ▶ScarCruft continues to evolve, introduces Bluetooth harvester securelistcom/scarcruft-continues-to-evolve-introduces-bluetooth-harvester/90729/ (May

本项目仅用于记录团队内部分享议题及一些大事件,记录团队成长的过程。

红日安全-成长日记 本项目仅用于记录团队内部分享议题及一些大事件,记录团队成长的过程。 2019年 3月31日 : 小组 分享议题 分享人 工具组 zmap核心技术剖析 陈平 企业安全组 极验业务沙龙分享:中小互联网企业风控场景与填坑笔记 RiCky SRC组 小白的扫描器之路之指纹识别 瓜子

CobaltStrike资源大全

《深入理解Cobalt Strike》 这里记录收集优秀的CobaltStrike内容,包括优秀的资源工具或优秀的项目代码等。本项目大部分工具都未检测是否存在后门,务必在虚拟机下运行。CobaltStrike思想是攻击者的进步。作者:0e0w 本项目创建时间为2021年8月3日。最近的一次更新时间为2023年8月4日。 01-Coba

CVE-2018-4878 POC CVE-2018-4878 was first demonstrated being exploited in the wild by TEMPReaper This repository contains the POC we created from the analysed malware, which is known to work against 32-bit versions of Flash 27 by exploiting a Use-After-Free vulnerability Successful exploitation provides the attacker with a ByteArray object capable of modifying process memory

A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net

malware-samples A collection of malware samples and relevant dissection information, most probably referenced from bloginquestnet or twittercom/inquest Be sure to also check out the Deep File Inspection (DFI) portion of labsinquestnet for an interactive searchable interface to a large corpus (>500K) of downloadable malware lures CVE-2018-48

внутренности windows wwwgeoffchappellcom/indexhtm очень интересный блог blogdidierstevenscom/ колекция техник инжекта) githubcom/snovvcrash/DInjector WMI attack (real sheet) 0xinfectiongithubio/posts/ COOL XRэнь attackdefensecom/listingnoauth?labtype=windows-post-exploitation

POSHC2: PoshC2 is a proxy aware C2 framework that utilises Powershell and/or equivalent (SystemManagementAutomationdll) to aid penetration testers with red teaming, post-exploitation and lateral movement Invoke-PSImage: Embeds a PowerShell script in the pixels of a PNG file and generates a oneliner to execute pupy: Pupy is a cross-platform, multi function RAT and post-explo

Bunch of Random Tools

Tools Bunch of Random Offensive Tools, Libraries, and Compilers githubcom/haidragon/dylib_inject githubcom/haidragon/goEncrypt githubcom/haidragon/JustTrustMe githubcom/haidragon/fireELF githubcom/haidragon/AvastHV githubcom/haidragon/win10_UserApcInject githubcom/haidragon/win10_CreateRemoteThread githubco

Recent Articles

APT Trends Report Q2 2018
Securelist • GReAT • 10 Jul 2018

In the second quarter of 2017, Kaspersky Lab’s Global Research and Analysis Team (GReAT) began publishing summaries of the quarter’s private threat intelligence reports, in an effort to make the public aware of the research we have been conducting. This report serves as the latest installment, focusing on the relevant activities that we observed during Q2 2018. These summaries are a representative snapshot of what has been discussed in greater detail in our private reports. They aim to highl...

IT threat evolution Q1 2018. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Alexander Liskin Oleg Kupreev • 14 May 2018

According to KSN: In Q1 2018, DNS-hijacking, a new in-the-wild method for spreading mobile malware on Android devices, was identified. As a result of hacked routers and modified DNS settings, users were redirected to IP addresses belonging to the cybercriminals, where they were prompted to download malware disguised, for example, as browser updates. That is how the Korean banking Trojan Wroba was distributed. It wasn’t a drive-by-download case, since the success of the attack largely depended ...

APT Trends report Q1 2018
Securelist • GReAT • 12 Apr 2018

In the second quarter of 2017, Kaspersky’s Global Research and Analysis Team (GReAT) began publishing summaries of the quarter’s private threat intelligence reports in an effort to make the public aware of the research we have been conducting. This report serves as the next installment, focusing on the relevant activities that we observed during Q1 2018. These summaries serve as a representative snapshot of what has been discussed in greater detail in our private reports, in order to highlig...

Patch or ditch Adobe Flash: Exploit on sale, booby-trapped Office docs spotted in the wild
The Register • Thomas Claburn in San Francisco • 09 Apr 2018

ThreadKit leverages flaw fixed in February Exploit kit development has gone to sh$t... ever since Adobe Flash was kicked to the curb

In case you needed another reason not to open Adobe Flash or Microsoft Office files from untrusted sources: ThreadKit, an app for building documents that infect vulnerable PCs with malware when opened, now targets a recently patched Flash security bug. This means less-than-expert hackers can use ThreadKit to craft booby-trapped Office files, and fling them at victims in emails or downloads, so that when they are viewed on unpatched systems, malicious code within the files is executed via the Fla...

Adobe: Two critical Flash security bugs fixed for the price of one
The Register • Iain Thomson in San Francisco • 06 Feb 2018

Emergency patch lands, shuts pair of remote exploitable holes, one used by Norks

Adobe has issued an emergency security patch for two bugs in its Flash player – after North Korea's hackers were spotted exploiting one of the flaws to spy on people investigating the creepy hermit nation. At the start of the month, South Korea's Computer Emergency Response Team put the world on alert after it found miscreants abusing Flash to take control of and surveil Windows PCs in its country via Office documents carrying embedded malicious SWF files. Subsequent analysis showed the hackin...

Nork hackers exploit Flash bug to pwn South Koreans. And Adobe will deal with it next week
The Register • Iain Thomson in San Francisco • 01 Feb 2018

Maybe it's a good time to just delete the thing

Adobe will next week emit patches to squash a security bug in Flash that can be exploited by malicious webpages and documents, when opened, to hijack and spy on vulnerable computers. The flaw is being abused right now by North Korean hackers to infect victims' PCs. You should update your browser or Flash installation – if you're still using Flash – as soon as the fix lands so other miscreants can't exploit the vulnerability and potentially commandeer your machine. The programming cockup (CVE...