#VU2672 Security bypass in Adobe Acrobat


Published: 2016-12-22 | Updated: 2017-01-09

Vulnerability identifier: #VU2672

Vulnerability risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2009-3461

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Adobe Acrobat
Client/Desktop applications / Office applications

Vendor: Adobe

Description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to insufficient access controls that leads to file extension security controls bypass.

Succesful exploitation of the vulnerability results in file-extension restrictions bypass on the vulnerable system.

Mitigation
Update Adobe Acrobat for Windows and Macintosh to version 9.2:
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows
http://www.adobe.com/support/downloads/product.jsp?product=158&platform=Windows
http://www.adobe.com/support/downloads/product.jsp?product=112&platform=Windows
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh

Vulnerable software versions

Adobe Acrobat: 9.0 - 9.1.3


External links
http://www.adobe.com/support/security/bulletins/apsb09-15.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability