Now you have two problems, and one of them is Flash.

Project Zero: (^Exploiting)\s(CVE-2015-0318)\s(in)\s*(Flash$)

Quick summary - it's a bug in the PCRE regex engine as used in Flash. Spoiler: it's exploitable. [...]

Below is what happens when we compile a regex that combines the \c escape sequence (which is intended to match a single ASCII character) with a multibyte UTF-8 character. A simple trigger for the bug is '\\c\xd0\x80+', below. [...]

So clearly something has gone wrong... The question is now how to leverage this invalid bytecode to get code execution.

Previously, previously, previously, previously, previously, previously, previously, previously.

Tags: , , ,

InstaDoom

Doom has been modded to have Instagram filters and a selfie stick.


"Use the rule of thirds to compose your slaughter!"

Previously, previously, previously, previously, previously.

Tags: , ,

  • Previously