Executive Summary
Summary | |
---|---|
Title | Adobe Reader and Acrobat Font Parsing Buffer Overflow Vulnerability |
Informations | |||
---|---|---|---|
Name | VU#491991 | First vendor Publication | 2010-09-14 |
Vendor | VU-CERT | Last vendor Modification | 2010-10-29 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#491991Adobe Reader and Acrobat Font Parsing Buffer Overflow VulnerabilityOverviewA vulnerability has been discovered in Adobe Reader and Acrobat that may be exploited to run arbitrary code.I. DescriptionA critical vulnerability exists in the font parsing code of CoolType.dll. A vulnerable strcat call is used when parsing data within the "SING" table of a TrueType font. The vulnerability has been confirmed in versions 8.2.4 and 9.3.4 of both Reader and Acrobat. Older versions may also be affected. There have been reports of this vulnerability being actively exploited in the wild.II. ImpactAn attacker may use a specifically crafted PDF document to cause a crash or execute arbitrary code.III. SolutionApply an updateAdobe recommends all users upgrade to Adobe Reader and Acrobat 9.4 or 8.2.5. APSB10-21 contains more details.
Prevent Internet Explorer from automatically opening PDF documents The installer for Adobe Reader and Acrobat configures Internet Explorer to automatically open PDF files without any user interaction. This behavior can be reverted to the safer option of prompting the user by importing the following as a .REG file:
[HKEY_CLASSES_ROOTAcroExch.Document.7] "EditFlags"=hex:00,00,00,00 Preventing PDF documents from opening inside a web browser reduces attack surface. If this workaround is applied to updated versions of Adobe Reader and Acrobat, it may protect against future vulnerabilities. To prevent PDF documents from automatically being opened in a web browser with Adobe Reader:
Vendor Information
Referenceshttp://secunia.com/advisories/41340 This document was written by Jared Allar.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/491991 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11586 | |||
Oval ID: | oval:org.mitre.oval:def:11586 | ||
Title: | Adobe Reader and Acrobat CoolType.dll Font Parsing Buffer Overflow Vulnerability | ||
Description: | Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010. NOTE: some of these details are obtained from third party information. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2883 | Version: | 20 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows 7 | Product(s): | Adobe Reader Adobe Acrobat |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Adobe Reader CoolType.dll buffer overflow | More info here |
ExploitDB Exploits
id | Description |
---|---|
2010-09-25 | Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow |
2010-09-20 | Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow |
OpenVAS Exploits
Date | Description |
---|---|
2011-03-09 | Name : Gentoo Security Advisory GLSA 201101-08 (acroread) File : nvt/glsa_201101_08.nasl |
2010-10-19 | Name : SuSE Update for acroread SUSE-SA:2010:048 File : nvt/gb_suse_2010_048.nasl |
2010-10-18 | Name : Adobe Acrobat and Reader Multiple Vulnerabilities -Oct10 (Windows) File : nvt/gb_adobe_prdts_mult_vuln_oct10_win.nasl |
2010-09-15 | Name : Adobe Acrobat and Reader SING 'uniqueName' Buffer Overflow Vulnerability (Win) File : nvt/gb_adobe_prdts_sing_bof_vuln_win.nasl |
2010-09-15 | Name : Adobe Acrobat and Reader SING 'uniqueName' Buffer Overflow Vulnerability (Linux) File : nvt/gb_adobe_reader_sing_bof_vuln_lin.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
67849 | Adobe Reader / Acrobat CoolType.dll SING (Smart INdependent Glyphlets) Font u... Acrobat and Reader are prone to an overflow condition. The application fails to properly sanitize the "uniqueName" field within the SING table structure of TrueType fonts resulting in a stack buffer overflow. With a specially crafted file, a context-dependent attacker can potentially cause arbitrary code execution. |
Snort® IPS/IDS
Date | Description |
---|---|
2020-01-16 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 52484 - Revision : 1 - Type : FILE-PDF |
2020-01-16 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 52483 - Revision : 1 - Type : FILE-PDF |
2019-12-10 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 52125 - Revision : 2 - Type : FILE-PDF |
2019-12-10 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 52124 - Revision : 2 - Type : FILE-PDF |
2015-03-31 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 33602 - Revision : 2 - Type : FILE-PDF |
2015-03-31 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 33601 - Revision : 2 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28657 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28656 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28655 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28654 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28653 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28652 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28651 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28650 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28649 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28648 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28647 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28646 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28645 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28644 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28380 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28379 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28378 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28377 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28376 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28375 - Revision : 5 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 28374 - Revision : 6 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 18991 - Revision : 13 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 18990 - Revision : 13 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 18989 - Revision : 13 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 18988 - Revision : 12 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 18987 - Revision : 15 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader and Acrobat TTF SING table parsing remote code execution... RuleID : 18986 - Revision : 15 - Type : FILE-PDF |
2014-01-10 | Adobe Acrobat Reader TTF SING table parsing remote code execution attempt RuleID : 17233 - Revision : 13 - Type : FILE-PDF |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_acroread-101007.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread-7181.nasl - Type : ACT_GATHER_INFO |
2011-01-27 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_acroread_ja-7182.nasl - Type : ACT_GATHER_INFO |
2011-01-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201101-08.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_acroread-101007.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_acroread_ja-101007.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_acroread-101007.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_acroread-101007.nasl - Type : ACT_GATHER_INFO |
2010-10-07 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0743.nasl - Type : ACT_GATHER_INFO |
2010-09-09 | Name : The version of Adobe Acrobat on the remote Windows host is affected by multip... File : adobe_acrobat_apsa10-02.nasl - Type : ACT_GATHER_INFO |
2010-09-09 | Name : The version of Adobe Reader on the remote Windows host is affected by multipl... File : adobe_reader_apsa10-02.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:07:53 |
|