header-logo
Suggest Exploit
vendor:
Acrobat Reader
by:
bl4cksecurity
7.8
CVSS
HIGH
Adobe Acrobat Reader JBIG2 Universal Exploit
119
CWE
Product Name: Acrobat Reader
Affected Version From: Adobe Acrobat Reader 8.1.2
Affected Version To: Adobe Acrobat Reader 9.1.3
Patch Exists: YES
Related CWE: CVE-2009-0658
CPE: a:adobe:acrobat_reader:8.1.2
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009

Adobe Acrobat Reader JBIG2 Universal Exploit Bind Shell port 5500

This exploit allows attackers to gain remote access to a vulnerable system by exploiting a vulnerability in Adobe Acrobat Reader. The vulnerability is caused due to a boundary error in the handling of JBIG2 streams within the PDF documents. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted PDF file. Successful exploitation allows execution of arbitrary code.

Mitigation:

Users should update to the latest version of Adobe Acrobat Reader. Additionally, users should exercise caution when opening files from untrusted sources.
Source

Exploit-DB raw data:

Adobe Acrobat Reader JBIG2 Universal Exploit Bind Shell port 5500

write up: http://bl4cksecurity.blogspot.com/2009/03/adobe-acrobatreader-universal-exploit.html

down: http://blacksecurity.org/download/66/Adobe_JBIG2_Universal_Reader_Acrobat_Exploit
back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8280.zip (2009-bl4ck-adobe.zip)

# milw0rm.com [2009-03-24]