iDefense Security Advisory 06.10.10 – Remote exploitation of a use-after-free vulnerability in Adobe Systems Inc.’s Flash Player could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability takes place during the processing of a certain image type within a certain function. The image is positioned at a location on a linked list. On return from the function, an object is de-allocated and a stale pointer continues to reference the object. Arbitrary code execution can occur when the object is used after it has been de-allocated. Memory that was previously allocated for the object can used by an attacker.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/90544/06.10.10-2.txt
Source: https://packetstormsecurity.com/files/90544/iDEFENSE-Security-Advisory-2010-06-10.2.html

