Improper input validation in Adobe Reader and Adobe Acrobat - CVE-2010-3625

 

Improper input validation in Adobe Reader and Adobe Acrobat - CVE-2010-3625

Published: January 5, 2017


Vulnerability identifier: #VU3498
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2010-3625
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Adobe
Affected software:
Adobe Reader
Adobe Acrobat

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when processing PDF protocol handlers. A remote attacker can create a specially crafted URI, trick the victim into clicking on it and execute arbitrary commands on vulnerable system.

Successful exploitation of the vulnerability results in compromise of vulnerable system.


How to mitigate CVE-2010-3625

Install the latest version from vendor's website. The vulnerability is fixed in Adobe Reader and Acrobat 9.4 and 8.2.5.

Sources