Adobe has re-released a security bulletin with updated software to address the BMP ColorData processing rt3d.dll arbitrary code execution vulnerability. Red Hat has also released a security advisory and updated packages to address this vulnerability.
Adobe Acrobat and Reader contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system.
The vulnerability is due to improper processing of bitmap images that are embedded in .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. The processing of the file could allow the attacker to execute arbitrary code on the system with the privileges of the user.
Adobe has confirmed this vulnerability and released updated software.
The following Adobe products are vulnerable:
Adobe Reader versions 9.4.1 and prior, versions 8.2.5 and prior, and version 10.0
Acrobat Standard and Professional versions 9.4.1 and prior and version 10.0
Acrobat Standard and Professional versions 8.2.5 and prior
Acrobat Professional Extended versions 9.4.1 and prior
Acrobat 3D versions 8.2.5 and prior
To exploit this vulnerability, the attacker must convince a user to visit a specific website that is hosting a .pdf file that is embedded with a malicious bitmap file. To achieve this objective, an attacker may use social engineering tactics, such as sending a link to the site via e-mail, instant messaging, or other forms of communication.
Adobe has re-released a security bulletin at the following link: APSB11-03
Red Hat has released a security advisory at the following link: RHSA-2011:0301
An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code on the system with the privileges of the user. If the user holds Administrator privileges, a complete system compromise could be possible.
The vulnerability is in the rt3d.dll component of the affected software, which parses bitmap images that are embedded in Adobe Reader files. The affected component incorrectly assigns the destination memory buffer while handling 4-bit or 8-bit run-length encoding (RLE) compressed bitmap files by creating a memory pointer that is based on color depth values contained in the file. This memory pointer could be controlled by the attacker to cause the application to copy malicious data into the color data heap memory buffer.
An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to execute a crafted .pdf that contains malicious .bmp images. The processing of the file could allow the attacker to manipulate the application memory state and execute arbitrary code on the system with the privileges of the user.
Administrators are advised to apply the appropriate updates.
Users are advised not to open e-mail messages from suspicious or unrecognized sources. If users cannot verify that links or attachments included in e-mail messages are safe, they are advised not to open them.
Users should verify that unsolicited links are safe to follow.
Administrators are advised to monitor critical systems.
Adobe has released updates via software automatic update mechanisms or at the following links:
Version 1, February 9, 2011, 10:06 AM: Adobe Acrobat and Reader contain a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the targeted system. Updates are available.
LEGAL DISCLAIMER The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.