Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Vulnerability Alert

Adobe Acrobat and Reader Remote Arbitrary Code Execution Vulnerability

 
Threat Type:IntelliShield: Applied Mitigation Bulletin
IntelliShield ID:19180
Version:6
First Published:2009 October 08 21:57 GMT
Last Published:2009 December 02 13:46 GMT
Port: Not available
CVE:CVE-2007-0045 , CVE-2007-0048 , CVE-2009-2564 , CVE-2009-2979 , CVE-2009-2980 , CVE-2009-2981 , CVE-2009-2982 , CVE-2009-2983 , CVE-2009-2984 , CVE-2009-2985 , CVE-2009-2986 , CVE-2009-2987 , CVE-2009-2988 , CVE-2009-2989 , CVE-2009-2990 , CVE-2009-2991 , CVE-2009-2992 , CVE-2009-2993 , CVE-2009-2994 , CVE-2009-2995 , CVE-2009-2996 , CVE-2009-2997 , CVE-2009-2998 , CVE-2009-3431 , CVE-2009-3458 , CVE-2009-3459 , CVE-2009-3460 , CVE-2009-3461 , CVE-2009-3462
BugTraq ID:36600
Urgency:Unlikely Use
Credibility:Confirmed
Severity:Moderate Damage
CVSS Base:9.3 CVSS Calculator
CVSS Version 2.0
CVSS Temporal:7.7
Related Resources:
 
 
Version Summary:

Sun has re-released an alert notification with updated software to address the Adobe Acrobat and Reader remote arbitrary code execution vulnerability.

 
 
Description

Adobe Acrobat and Reader contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code with the privileges of the user.

The vulnerability is due to a lack of boundary checking in the affected products.  An unauthenticated, remote attacker could exploit this vulnerability by convincing a targeted user to view a crafted .pdf file with affected software. Opening the malicious file could trigger a buffer overflow that is exploitable for code execution with the privileges of the user.

Functional exploit code is circulating in the wild.

Adobe has confirmed this vulnerability and released updated software.

 
Warning Indicators

The following Adobe Products are vulnerable:

  • Adobe Acrobat Reader versions 9.1.3 and prior
  • Adobe Acrobat Professional versions 9.1.3 and prior
  • Adobe Acrobat Professional Extended versions 9.1.3 and prior
  • Adobe Acrobat Standard versions 9.1.3 and prior
  • Adobe Acrobat Reader versions 8.1.6 and prior
  • Adobe Acrobat Professional versions 8.1.6 and prior
  • Adobe Acrobat Standard versions 8.1.6 and prior
  • Adobe Acrobat 3D versions 8.1.6 and prior
  • Adobe Acrobat Reader versions 7.1.3 and prior
  • Adobe Acrobat Professional versions 7.1.3 and prior
  • Adobe Acrobat Standard versions 7.1.3 and prior
  • Adobe Acrobat 3D versions 7.1.3 and prior

 
IntelliShield Analysis

To exploit the vulnerability, an attacker must persuade a user to view a malicious .pdf file.? The attacker may provide a file to the user as part of an e-mail message or host the file on a website and use social engineering techniques to persuade the targeted user to view the malicious file.

The vulnerability affects the Windows, Macintosh, and UNIX platforms.? Exploits targeting the Windows platform are known to be occurring in the wild.? Users of Windows Vista can protect against this vulnerability by enabling Data Execution Prevention (DEP) protection.? Disabling JavaScript may help mitigate the vulnerability, but exploits that do not use JavaScript are also a possibility.

 
Vendor Announcements

Adobe has re-released a security advisory at the following link: APSB09-15

Red Hat has released a security advisory at the following link: RHSA-2009:1499

Sun has re-released an alert notification at the following link: 270669

 
Impact

An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user.? If the user holds administrative rights, this could result in a full system compromise.

 
Technical Information

The vulnerability is due to a heap-based buffer overflow in the affected products.? Additional technical information is not available.

 
Safeguards

Administrators are advised to apply the appropriate updates.

Users are advised not to open e-mail messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in e-mail messages are safe, they are advised not to open them.

Users are advised not to visit websites or follow links that have suspicious characteristics or cannot be verified as safe.

 
Patches/Software

Adobe has released updated software at the following links:

Red Hat packages can be updated using the up2date or yum command.

Sun has released a patch at the following link:

SPARC
Solaris 10 with patch 121104-11 or later


Signatures
 
Cisco Intrusion Prevention System (IPS) 6.0
Signature IDSignature NameReleaseLatest Release Date
21841/0Adobe PDF Deflate Parameter Integer OverflowS5182010 Oct 05 
 
Alert History
 

Version 5, October 26, 2009, 10:10 AM: Sun has released an alert notification to address the Adobe Acrobat and Reader remote arbitrary code execution vulnerability.

Version 4, October 14, 2009, 5:26 PM: Red Hat has released a security advisory and software updates to address the Adobe Acrobat and Reader remote arbitrary code execution vulnerability.

Version 3, October 13, 2009, 5:58 PM:  Adobe has re-released a security advisory along with software updates to address the Adobe Acrobat and Reader remote arbitrary code execution vulnerability.

Version 2, October 9, 2009, 4:46 PM:  Adobe has released a security advisory regarding the Adobe Acrobat and Reader remote arbitrary code execution vulnerability.

Version 1, October 8, 2009, 5:57 PM:  Adobe Acrobat and Reader contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code with user privileges.  Updates are not available.



Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
AdobeAcrobat 3D 7.1 Base, .1, .2, .3 | 8.1 .0, .1, .2, .3, .4, ,5, .6
AdobeAcrobat Professional 7.1 .0, .1, .2, .3 | 8.1 .0, .1, .2, .3, .4, .5, .6 | 9.1 .0, .1, .2, .3
AdobeAcrobat Professional Extended 9.1 .0, .1, .2, .3
AdobeAcrobat Reader 7.1 Base, .1, .2, .3 | 8.1 Base | 8.1.1 Base | 8.1.2 .0, .1 | 8.1.3 Base | 8.1.4 Base | 8.1.5 Base | 8.1.6 Base | 9.1 .0, .1, .2, .3
AdobeAcrobat Standard 7.1 .0, .1, .2, .3 | 8.1 Base | 8.1.1 Base | 8.1.2 Base | 8.1.3 Base | 8.1.4 Base | 8.1.5 Base | 8.1.6 Base | 9.1 .0, .1, .2, .3

Associated Products:
Red Hat, Inc.Red Hat Enterprise Linux Desktop Supplementary 5.0 IA-32, x86-64
Red Hat, Inc.Red Hat Enterprise Linux Extras 3 IA-32, x86_64 | 4 IA-32, x86_64 | 4.8.z IA-32, x86_64
Red Hat, Inc.RHEL Supplementary 5 IA-32, x86_64
Red Hat, Inc.RHEL Supplementary EUS 5.4.z IA-32, x86_64
Sun Microsystems, Inc.Solaris 10 sparc




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield