vendor:
Reader/Acrobat
by:
Soroush Dalili
7.8
CVSS
HIGH
Memory Corruption Denial of Service
119
CWE
Product Name: Reader/Acrobat
Affected Version From: 10.0.1
Affected Version To: 14 June 2011 Patch
Patch Exists: YES
Related CWE: CVE-2011-0609
CPE: a:adobe:reader
Metasploit:
https://www.rapid7.com/db/vulnerabilities/adobe-apsb11-05-CVE-2011-0609/, https://www.rapid7.com/db/vulnerabilities/adobe-apsb11-06-CVE-2011-0609/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-0372/, https://www.rapid7.com/db/vulnerabilities/adobe-air-cve-2011-0609/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-501ee07a-5640-11e0-985a-001b2134ef46/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2011-0609/, https://www.rapid7.com/db/vulnerabilities/adobe-reader-apsb11-06-CVE-2011-0609/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2011-0609/, https://www.rapid7.com/db/vulnerabilities/adobe-apsb11-04-CVE-2011-0609/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 SP1, Windows XP SP3
2011
Adobe Reader/Acrobat Memory Corruption Denial of Service
A vulnerability in Adobe Reader/Acrobat could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to a memory corruption issue when processing a specially crafted PDF file. An attacker could exploit this vulnerability by convincing a user to open a malicious PDF file. Successful exploitation could result in a DoS condition.
Mitigation:
Adobe has released a patch to address this vulnerability. Users should upgrade to the latest version of Adobe Reader/Acrobat.