CVE-2018-4878 POC

CVE-2018-4878 was first demonstrated being exploited in the wild by TEMP.Reaper.

This repository contains the POC we created from the analysed malware, which is known to work against 32-bit versions of Flash 27 by exploiting a Use-After-Free vulnerability.

Successful exploitation provides the attacker with a ByteArray object capable of modifying process memory.

The full breakdown of the vulnerability can be found here.