#VU1335 Security bypass in Adobe Reader and Adobe Acrobat


Published: 2016-12-15 | Updated: 2022-06-08

Vulnerability identifier: #VU1335

Vulnerability risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:H/RL:O/RC:C]

CVE-ID: CVE-2008-0655

CWE-ID: CWE-399

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Adobe Reader
Client/Desktop applications / Office applications
Adobe Acrobat
Client/Desktop applications / Office applications

Vendor: Adobe

Description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to an error in JavaScript API DOC.print function. A remote attacker can create a specially crafted PDF file, persuade a victim to open it and configure silent unauthorized printing of 1000 copies from a PDF file.

Successful exploitation of the vulnerability results in unauthorized access to the vulnerable system.

Mitigation
Install update from vendor's website:

Adobe Reader 7 and 8:
https://www.adobe.com/products/acrobat/readstep2.html
Adobe Acrobat for Windows:
https://www.adobe.com/support/downloads/detail.jsp?ftpID=3849
Adobe Acrobat for Macintosh:
https://www.adobe.com/support/downloads/detail.jsp?ftpID=3856
Adobe Acrobat 3D version:
https://www.adobe.com/support/downloads/detail.jsp?ftpID=3850
Adobe Reader 7:
https://www.adobe.com/go/getreader
Adobe Acrobat 7 for Windows:
https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows
Adobe Acrobat 7 for Macintosh:
https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh

Vulnerable software versions

Adobe Reader: 8.0 - 8.1.2, 7.0 - 7.0.9

Adobe Acrobat: 7.0 - 7.1.0, 8.0 - 8.1.2


External links
http://www.adobe.com/support/security/bulletins/apsb08-13.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability