Skip to main content

Adobe Reader / Acrobat Multiple Vulnerabilities

Last Update Date: 16 Jun 2011 15:42 Release Date: 16 Jun 2011 5529 Views

RISK: High Risk

TYPE: Clients - Productivity Products

TYPE: Productivity Products

Multiple vulnerabilities have been identified in Adobe Reader / Acrobat, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  1. An error in 3difr.x3d and tesselate.x3d due to the component trusting the provided string length when processing certain files can be exploited to cause a stack-based buffer overflow.
  2. An unspecified error can be exploited to cause a heap-based buffer overflow.
  3. An integer overflow error in ACE.dll when parsing the "desc" ICC chunk can be exploited to corrupt memory via a specially crafted PDF file.
  4. An unspecified error can be exploited to corrupt memory.
  5. An error due to the application loading certain unspecified libraries in an insecure manner can be exploited to load arbitrary libraries by tricking a user into e.g. opening a file located on a remote WebDAV or SMB share.
  6. Certain unspecified input is not properly sanitised and can be exploited to execute arbitrary script code.
  7. An unspecified error can be exploited to bypass certain security restrictions, which affects Adobe Reader and Acrobat X 10.x only.
  8. An unspecified error can be exploited to corrupt memory.

Impact

  • Cross-Site Scripting
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure

System / Technologies affected

  • Adobe Reader X (10.0.1) and earlier for Windows.
  • Adobe Reader X (10.0.3) and earlier for Macintosh.
  • Adobe Reader 9.4.4 and earlier for Windows and Macintosh.
  • Adobe Reader 8.2.6 and earlier for Windows and Macintosh.
  • Adobe Acrobat X (10.0.3) and earlier for Windows and Macintosh.
  • Adobe Acrobat 9.4.4 and earlier for Windows and Macintosh.
  • Adobe Acrobat 8.2.6 and earlier for Windows and Macintosh.

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link