SB2008020701 - Multiple vulnerabilities in Adobe Reader and Adobe Acrobat



SB2008020701 - Multiple vulnerabilities in Adobe Reader and Adobe Acrobat

Published: February 7, 2008 Updated: December 15, 2016

Security Bulletin ID SB2008020701
Severity
Critical
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 17% High 50% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Stack-based buffer overflow (CVE-ID: CVE-2007-5659)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to a boundary error within Javascript method. A remote attacker can create a specially .pdf file, trick the victim into opening it, trigger stack-based buffer overflow and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

Note: the vulnerability was being actively exploited.

2) Security bypass (CVE-ID: CVE-2008-0667)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to an error in JavaScript API DOC.print function. By sending a malicious PDF file and persuading a victim to open it, a remote attacker can configure silent non-interactive printing of an arbitrary number of copies of .pdf files.

Successful exploitation of the vulnerability results in unauthorized access to the vulnerable system.

3) Untrusted search path (CVE-ID: CVE-2007-5666)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the way the application loads .dll libraries. A remote attacker can place a specially crafted .dll file along with PDF document on a remote SMB or WebDav share, trick the victim into opening that document and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


4) Memory corruption (CVE-ID: CVE-2007-5663)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to buffer overflow whithin JavaScript implementation. A remote attacker can create a specially .pdf file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

5) Integer overflow (CVE-ID: CVE-2008-0726)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to integer overflow in a JavaScript function. A remote attacker can create a specially crafted .pdf file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.

6) Security bypass (CVE-ID: CVE-2008-0655)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to an error in JavaScript API DOC.print function. A remote attacker can create a specially crafted PDF file, persuade a victim to open it and configure silent unauthorized printing of 1000 copies from a PDF file.

Successful exploitation of the vulnerability results in unauthorized access to the vulnerable system.

Remediation

Install update from vendor's website.