Vulnerability identifier: #VU1331
Vulnerability risk: Low
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Adobe Acrobat
Client/Desktop applications /
Office applications
Adobe Reader
Client/Desktop applications /
Office applications
Vendor: Adobe
Description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The weakness exists due to an error in JavaScript API DOC.print function. By sending a malicious PDF file and persuading a victim to open it, a remote attacker can configure silent non-interactive printing of an arbitrary number of copies of .pdf files.
Successful exploitation of the vulnerability results in unauthorized access to the vulnerable system.
Mitigation
Install update from vendor's website:
Adobe Reader 7 and 8:
https://www.adobe.com/products/acrobat/readstep2.html
Adobe Acrobat for Windows:
https://www.adobe.com/support/downloads/detail.jsp?ftpID=3849
Adobe Acrobat for Macintosh:
https://www.adobe.com/support/downloads/detail.jsp?ftpID=3856
Adobe Acrobat 3D version:
https://www.adobe.com/support/downloads/detail.jsp?ftpID=3850
Adobe Reader 7:
https://www.adobe.com/go/getreader
Adobe Acrobat 7 for Windows:
https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows
Adobe Acrobat 7 for Macintosh:
https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh
Vulnerable software versions
Adobe Acrobat: 7.0 - 7.1.0, 8.0 - 8.1.2
Adobe Reader: 8.0 - 8.1.2, 7.0 - 7.0.9
CPE
External links
http://www.adobe.com/support/security/bulletins/apsb08-13.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?