what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Adobe Acrobat Code Execution

Adobe Acrobat Code Execution
Posted Oct 17, 2009
Authored by Alexios Fakos | Site nruns.com

A remotely exploitable vulnerability has been found in Adobe Acrobat Reader/Acrobat Firefox plugin. Versions 8.1.3 through 8.1.6 are affected.

tags | advisory
advisories | CVE-2009-2991
SHA-256 | 02dfa8f527d8d6db4d18a0236b10c85a02cc3272c626c753553d001851062481

Adobe Acrobat Code Execution

Change Mirror Download
n.runs AG
http://www.nruns.com/ security(at)nruns.com
n.runs-SA-2009.007 15-Oct-2009
_______________________________________________________________________

Vendor: Adobe Systems Incorporated, http://www.adobe.com
Affected Products: Adobe Acrobat Reader/Acrobat
Version: 8.1.3 - 8.1.6
Platform: Windows
Vulnerability: Invalid pointer write could lead to arbitrary
code execution
Risk: HIGH
CVE: CVE-2009-2991
_______________________________________________________________________

Vendor communication:

2009/07/22 n.runs sends PoC to Mozilla Security team
2009/07/23 Brandon from Mozilla acknowledges the PoC file
2009/09/27 n.runs asking for status update
2009/09/29 Brandon apologizes the delay and replies he could not
reproduce the issue and asking for more information
2009/10/13 Adobe releases an update for this issue [1]
2009/10/13 n.runs informs Mozilla an update for the issue was
released by Adobe. n.runs asks if a Bugzilla entry exists

2009/10/13 Brandon replies he have not opened a bug in the Bugzilla
system, as he was not able to reproduce the issue yet, but
is looking at the Adobe advisory to see if there is
further work needed on Mozilla's side
2009/10/15 n.runs releases this advisory

_______________________________________________________________________


Overview:

Quoting http://www.adobe.com/aboutadobe/pressroom/pdfs/profile.pdf:
"Adobe revolutionizes how the world engages with ideas and information.
For 25 years, the company's award-winning software and technologies have
redefined business, entertainment, and personal communications by setting
new standards for producing and delivering content that engages people
virtually anywhere at anytime. From rich images in print, video, and
film to dynamic digital content for a variety of media, the impact of
Adobe solutions is evident across industries and felt by anyone who
creates, views, and interacts with information. With a reputation
for excellence and a portfolio of many of the most respected and
recognizable software brands, Adobe is one of the world's largest and
most diversified software companies."



Description:

A remotely exploitable vulnerability has been found in
Adobe Acrobat Reader/Acrobat Firefox plugin.

In detail, the following flaw was determined:

- The default settings of Adobe Acrobat Reader/Acrobat have been
applied. A non existing PDF file with-in the <embed> Tag could lead to
an invalid pointer write. This occurs when Adobe's PDF plugin gets
unloaded in a Firefox instance.



Impact

An attacker could exploit the vulnerability by constructing a specially
prepared Website. When a user views the Web page, the vulnerability
could allow remote code execution. An attacker who successfully
exploits this vulnerability could gain the same user rights as the
logged-on user.



Solution:

Adobe has issued an update to correct this vulnerability.
For detailed information about the fixes follow the link in
References [1] section of this document.


_______________________________________________________________________

Credit:
Bugs found by Alexios Fakos of n.runs AG.
_______________________________________________________________________

References:
[1] http://www.adobe.com/support/security/bulletins/apsb09-15.html

This Advisory and Upcoming Advisories:
http://www.nruns.com/security_advisory.php
_______________________________________________________________________

Unaltered electronic reproduction of this advisory is permitted. For
all other reproduction or publication, in printing or otherwise,
contact security@nruns.com for permission. Use of the advisory
constitutes acceptance for use in an "as is" condition. All warranties
are excluded. In no event shall n.runs be liable for any damages
whatsoever including direct, indirect, incidental, consequential loss
of business profits or special damages, even if n.runs has been advised
of the possibility of such damages.

Copyright 2009 n.runs AG. All rights reserved. Terms of use apply.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close