what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 19229

Secunia Security Advisory 19229
Posted Mar 15, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Adobe Document Server and Adobe Graphics Server, which can be exploited by malicious people to gain knowledge of potentially sensitive information, overwrite arbitrary files, or compromise a vulnerable system.

tags | advisory, arbitrary
SHA-256 | 8e13fbef886fa9d8524aa267f54e89e40cfbdb88b62f6b9d5c1547489304d732

Secunia Security Advisory 19229

Change Mirror Download


TITLE:
Adobe Document/Graphics Server File URI Resource Access

SECUNIA ADVISORY ID:
SA19229

VERIFY ADVISORY:
http://secunia.com/advisories/19229/

CRITICAL:
Moderately critical

IMPACT:
Manipulation of data, Exposure of sensitive information, System
access

WHERE:
>From local network

SOFTWARE:
Adobe Graphics Server 2.x
http://secunia.com/product/5397/
Adobe Document Server 5.x
http://secunia.com/product/8714/
Adobe Document Server 6.x
http://secunia.com/product/1224/

DESCRIPTION:
Secunia Research has discovered a vulnerability in Adobe Document
Server and Adobe Graphics Server, which can be exploited by malicious
people to gain knowledge of potentially sensitive information,
overwrite arbitrary files, or compromise a vulnerable system.

The vulnerability is caused due to the "loadContent", "saveContent",
and "saveOptimized" ADS (Adobe Document Server) commands allowing
graphics or PDF files to be retrieved from or saved to arbitrary
locations on the server using File URIs via the AlterCast web service
running on port 8019. Files can be saved with arbitrary extensions.
This can be exploited by sending a specially-crafted SOAP request to
write a graphics file (with HTA extension) containing malicious
JavaScript as metadata to e.g. the server's "All Users" startup
folder. This file will be executed the next time any user logs in.

Successful exploitation requires that the service is configured to
run with SYSTEM privileges (default) or with privileges of a normal
user that has been granted interactive logon rights.

The vulnerability has been confirmed in Document Server 6.0 (p026)
and Graphics Server 2.1 (d013). Other versions may also be affected.

SOLUTION:
The vendor has published additional hardening steps to prevent
exploitation of the vulnerability (see vendor advisory for details).

PROVIDED AND/OR DISCOVERED BY:
Tan Chew Keong, Secunia Research.

ORIGINAL ADVISORY:
Secunia Research:
http://secunia.com/secunia_research/2005-28/

Adobe:
http://www.adobe.com/support/techdocs/332989.html

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close