Secunia Advisory: SA34580
Release Date: 2009-06-10
Critical: Highly critical
Impact: System access
Where: From remote
Solution Status: Partial Fix
Software:
Adobe Acrobat 3D 8.x
Adobe Acrobat 7 Professional
Adobe Acrobat 7.x
Adobe Acrobat 8 Professional
Adobe Acrobat 8.x
Adobe Acrobat 9.x
Adobe Reader 7.x
Adobe Reader 8.x
Adobe Reader 9.x
Description:
Some vulnerabilities have been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to compromise a user's system.
1) A boundary error in the processing of Huffman encoded JBIG2 text region segments can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code via a specially crafted PDF document.
The vulnerability is confirmed in version 9.1.0. Other versions may also be affected.
2) An error can be exploited to cause a stack-based buffer overflow and potentially execute arbitrary code.
3) An integer overflow error can be exploited to potentially execute arbitrary code.
4) An unspecified error can be exploited to corrupt memory and potentially execute arbitrary code.
5) An error in the processing of JBIG2 data can be exploited to corrupt memory and potentially execute arbitrary code.
6) Another unspecified error can be exploited to corrupt memory and potentially execute arbitrary code.
7) Multiple errors in the JBIG2 filter can be exploited to cause heap-based buffer overflows and potentially execute arbitrary code.
8) An error in the JBIG2 filter can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code.
9) Multiple errors can be exploited to cause heap-based buffer overflows and potentially execute arbitrary code.
Solution:
Apply patches.
Dettagli
Fate la ricerca tramite l'update di adobe
Release Date: 2009-06-10
Critical: Highly critical
Impact: System access
Where: From remote
Solution Status: Partial Fix
Software:
Adobe Acrobat 3D 8.x
Adobe Acrobat 7 Professional
Adobe Acrobat 7.x
Adobe Acrobat 8 Professional
Adobe Acrobat 8.x
Adobe Acrobat 9.x
Adobe Reader 7.x
Adobe Reader 8.x
Adobe Reader 9.x
Description:
Some vulnerabilities have been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to compromise a user's system.
1) A boundary error in the processing of Huffman encoded JBIG2 text region segments can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code via a specially crafted PDF document.
The vulnerability is confirmed in version 9.1.0. Other versions may also be affected.
2) An error can be exploited to cause a stack-based buffer overflow and potentially execute arbitrary code.
3) An integer overflow error can be exploited to potentially execute arbitrary code.
4) An unspecified error can be exploited to corrupt memory and potentially execute arbitrary code.
5) An error in the processing of JBIG2 data can be exploited to corrupt memory and potentially execute arbitrary code.
6) Another unspecified error can be exploited to corrupt memory and potentially execute arbitrary code.
7) Multiple errors in the JBIG2 filter can be exploited to cause heap-based buffer overflows and potentially execute arbitrary code.
8) An error in the JBIG2 filter can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code.
9) Multiple errors can be exploited to cause heap-based buffer overflows and potentially execute arbitrary code.
Solution:
Apply patches.
Dettagli
Fate la ricerca tramite l'update di adobe