Macromedia Flash SWF Denial of Service Vulnerability
BID:2162
Info
Macromedia Flash SWF Denial of Service Vulnerability
| Bugtraq ID: | 2162 |
| Class: | Failure to Handle Exceptional Conditions |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 29 2000 12:00AM |
| Updated: | Dec 29 2000 12:00AM |
| Credit: | This vulnerability was first discovered by Neal Krawetz <[email protected]> in July of 2000, and announced via the Bugtraq mailing list on December 20, 2000. |
| Vulnerable: |
Macromedia Shockwave 8.0 |
| Not Vulnerable: | |
Discussion
Macromedia Flash SWF Denial of Service Vulnerability
Macromedia Flash is a modular package designed to enhance web browsing. A problem exists in the package that could cause a user's browser to crash.
The problem is in the handling of complex data by the Shockwave Flash plugin. Shockwave Flash files normally contain data in the format "tag length data." Complex data in a shockwave flash file contains data in the form of "tag length (subtag1 sublength1 subdata1 "0")". The plugin is dependent upon the ending "0" to signal the end of data and return to the main body of the file. If the placement of the zero exists beyond the specified "length" or "sublength" declaration, or doesn't exist at all, a read buffer overflow will occur that can allow a site with malicious flash content to crash browsers.
It is also reported that this issue results due to a buffer overflow that may allow for the arbitrary execution of code, but this claim is yet unverified.
This problem makes it possible for a user with malicious intent to crash browsers, resulting in a Denial of Service.
Macromedia Flash is a modular package designed to enhance web browsing. A problem exists in the package that could cause a user's browser to crash.
The problem is in the handling of complex data by the Shockwave Flash plugin. Shockwave Flash files normally contain data in the format "tag length data." Complex data in a shockwave flash file contains data in the form of "tag length (subtag1 sublength1 subdata1 "0")". The plugin is dependent upon the ending "0" to signal the end of data and return to the main body of the file. If the placement of the zero exists beyond the specified "length" or "sublength" declaration, or doesn't exist at all, a read buffer overflow will occur that can allow a site with malicious flash content to crash browsers.
It is also reported that this issue results due to a buffer overflow that may allow for the arbitrary execution of code, but this claim is yet unverified.
This problem makes it possible for a user with malicious intent to crash browsers, resulting in a Denial of Service.
Exploit / POC
Macromedia Flash SWF Denial of Service Vulnerability
nealk <[email protected]> has provided the following example exploit page:
http://home.attbi.com/~panic/Flash_and_Crash/
nealk <[email protected]> has provided the following example exploit page:
http://home.attbi.com/~panic/Flash_and_Crash/
Solution / Fix
Macromedia Flash SWF Denial of Service Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].