vendor:
Acrobat Reader
by:
k`sOSe
7.8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Acrobat Reader
Affected Version From: Adobe Acrobat Reader 8.1.2
Affected Version To: Adobe Acrobat Reader 9.3.2
Patch Exists: YES
Related CWE: CVE-2009-0658
CPE: a:adobe:acrobat_reader
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-0376/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2009-0927/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb09-04-CVE-2009-0927/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-0927/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-unspec-js-vuln/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2009-0658/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-0658/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb09-03-CVE-2009-0658/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb09-04-CVE-2009-0658/
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=40740, https://www.infosecmatter.com/nessus-plugin-library/?id=51690, https://www.infosecmatter.com/nessus-plugin-library/?id=41365, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/fileformat/adobe_jbig2decode, https://www.infosecmatter.com/nessus-plugin-library/?id=36033, https://www.infosecmatter.com/nessus-plugin-library/?id=40182, https://www.infosecmatter.com/nessus-plugin-library/?id=35821, https://www.infosecmatter.com/nessus-plugin-library/?id=36196, https://www.infosecmatter.com/nessus-plugin-library/?id=42433, https://www.infosecmatter.com/nessus-plugin-library/?id=31811
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2009
k`sOSe PDF Exploit
This exploit is a buffer overflow vulnerability in Adobe Acrobat Reader. It is triggered when a maliciously crafted PDF file is opened in Adobe Acrobat Reader. The exploit is based on a heap overflow vulnerability in the JBIG2Decode filter. The vulnerability is caused by a lack of proper validation of the size field in the JBIG2Decode filter. This allows an attacker to overwrite the heap memory with arbitrary data.
Mitigation:
Adobe released a patch to address this vulnerability. Users should update their Adobe Acrobat Reader to the latest version.