vendor:
Acrobat Reader
by:
bl4cksecurity
7.8
CVSS
HIGH
Adobe Acrobat Reader JBIG2 Universal Exploit
119
CWE
Product Name: Acrobat Reader
Affected Version From: Adobe Acrobat Reader 8.1.2
Affected Version To: Adobe Acrobat Reader 9.1.3
Patch Exists: YES
Related CWE: CVE-2009-0658
CPE: a:adobe:acrobat_reader:8.1.2
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2009-0376/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2009-0927/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb09-04-CVE-2009-0927/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-0927/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-unspec-js-vuln/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2009-0658/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2009-0658/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb09-03-CVE-2009-0658/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb09-04-CVE-2009-0658/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009
Adobe Acrobat Reader JBIG2 Universal Exploit Bind Shell port 5500
This exploit allows attackers to gain remote access to a vulnerable system by exploiting a vulnerability in Adobe Acrobat Reader. The vulnerability is caused due to a boundary error in the handling of JBIG2 streams within the PDF documents. This can be exploited to cause a stack-based buffer overflow by tricking a user into opening a specially crafted PDF file. Successful exploitation allows execution of arbitrary code.
Mitigation:
Users should update to the latest version of Adobe Acrobat Reader. Additionally, users should exercise caution when opening files from untrusted sources.