what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow

Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow
Posted Apr 16, 2010
Authored by TELUS Security Labs | Site telussecuritylabs.com

A remotely exploitable vulnerability has been discovered in Adobe Acrobat Reader for Linux. Specifically, the vulnerability is due to an integer overflow when processing the "Shading Count" field in the CLOD Mesh Declaration block, which may lead to a heap based buffer overflow and execution of arbitrary code. Adobe Systems Acrobat Reader versions 8.1.6, 9.2 and 9.3 for Linux are all affected.

tags | advisory, overflow, arbitrary
systems | linux
advisories | CVE-2010-0196
SHA-256 | f385ef95e1573ac6a4f3c822fd3e9df546151e7422ff23e8cba084c3366032a6

Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow

Change Mirror Download
Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow

TSL ID: FSC20100413-01

1. Affected Software

Adobe Systems Acrobat Reader 8.1.6 for Linux
Adobe Systems Acrobat Reader 9.2 for Linux
Adobe Systems Acrobat Reader 9.3 for Linux

Reference: http://get.adobe.com/reader/

2. Vulnerability Summary

A remotely exploitable vulnerability has been discovered in Adobe Acrobat Reader for Linux. Specifically, the vulnerability is due to an integer overflow when processing the "Shading Count" field in the CLOD Mesh Declaration block, which may lead to a heap based buffer overflow and execution of arbitrary code.

3. Vulnerability Analysis

This vulnerability may be exploited by remote attackers to execute arbitrary code on the vulnerable system by enticing a user to open a maliciously crafted PDF document. A successful attack will result in arbitrary code executed on the target host with the privileges of the logged-on user. An unsuccessful attack can abnormally terminate the affected product.

4. Vulnerability Detection

TELUS Security Labs has confirmed the vulnerability in:

Adobe Systems Acrobat Reader 8.1.6 for Linux
Adobe Systems Acrobat Reader 9.2 for Linux
Adobe Systems Acrobat Reader 9.3 for Linux

5. Workaround

Avoid opening untrusted PDF files, or use an alternative application to process PDF files.

6. Vendor Response

The vendor, Adobe, has released an advisory regarding this vulnerability:

http://www.adobe.com/support/security/bulletins/apsb10-09.html


7. Disclosure Timeline

2010-02-19 Reported to vendor
2010-02-19 Initial vendor response
2010-04-13 Coordinated public disclosure

8. Credits

Vulnerability Research Team, TELUS Security Labs

9. References

CVE: CVE-2010-0196
TSL: FSC20100413-01
Vendor: apsb10-09

10. About TELUS Security Labs

TELUS Security Labs, formerly Assurent Secure Technologies, is the leading provider of security research. Our research services include:

* Vulnerability Research
* Malware Research
* Signature Development
* Shellcode Exploit Development
* Application Protocols
* Product Security Testing
* Security Content Development (parsers, reports, alerts)

TELUS Security Labs provides a specialized portfolio of services to assist security product vendors with newly
discovered commercial product vulnerabilities and malware attacks. Many of our services are provided on a subscription basis to reduce research costs for our customers. Over 50 of the world's leading security product vendors rely on TELUS Security Labs research.

http://telussecuritylabs.com/
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close