FILE-FLASH -- Snort has detected suspicious traffic via the Adobe Flash Player. Flash is a common target of code execution, overflow, DoS, and memory corruption attacks in particular, via swifs, action scripts, etc. Many networks block Flash altogether; the application will be deprecated in 2020.
FILE-FLASH Adobe Flash Player FLV Nellymoser audio codec stack overflow attempt
This event is generated when an attacker attempts to exploit a stack overflow vulnerability in Adobe Flash Player.
Attempted User Privilege Gain
This rule checks for attempts to exploit a stack overflow vulnerability in Adobe Flash Player's parsing of FLV files with Nellymoser audio codecs.
Ease of Attack:
What To Look For
No public information
No known false positives
Cisco Talos Intelligence Group
MITRE ATT&CK Framework
For reference, see the MITRE ATT&CK vulnerability types here:
CVE Additional Information
CVE-2015-4432Heap-based buffer overflow in Adobe Flash Player before 220.127.116.112 and 14.x through 18.x before 18.104.22.168 on Windows and OS X and before 22.214.171.1241 on Linux, Adobe AIR before 126.96.36.199, Adobe AIR SDK before 188.8.131.52, and Adobe AIR SDK & Compiler before 184.108.40.206 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3135 and CVE-2015-5118.
||Ease of Access||LOW