Short Name |
HTTP:STC:ADOBE:PDF-FLATEDECODE
|
Severity |
High
|
Recommended |
No
|
Recommended Action |
Drop
|
Category |
HTTP
|
Keywords |
Adobe PDF FlateDecode Evasion Attempt
|
Release Date |
2009/07/24
|
Update Number |
1468
|
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vsrx-12.1+
|
HTTP: Adobe PDF FlateDecode Evasion Attempt
This signature detects attempts to bypass security devices using the obfuscated value of the FlateDecode method in a PDF document. Attackers can bypass security devices by using this method.
Extended Description
Adobe Reader and Acrobat are prone to an integer-overflow vulnerability.
An attacker can exploit this issue to execute arbitrary code. Failed exploit attempts will likely cause denial-of-service conditions.
NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.
Affected Products
- Adobe Acrobat Professional 7.0.0
- Adobe Acrobat Professional 7.0.1
- Adobe Acrobat Professional 7.0.2
- Adobe Acrobat Professional 7.0.3
- Adobe Acrobat Professional 7.0.4
- Adobe Acrobat Professional 7.0.5
- Adobe Acrobat Professional 7.0.6
- Adobe Acrobat Professional 7.0.7
- Adobe Acrobat Professional 7.0.8
- Adobe Acrobat Professional 7.0.9
- Adobe Acrobat Professional 7.1
- Adobe Acrobat Professional 7.1.1
- Adobe Acrobat Professional 8.0
- Adobe Acrobat Professional 8.1
- Adobe Acrobat Professional 8.1.1
- Adobe Acrobat Professional 8.1.2
- Adobe Acrobat Professional 8.1.2 Security Update 1
- Adobe Acrobat Professional 8.1.3
- Adobe Acrobat Professional 8.1.4
- Adobe Acrobat Standard 7.0.0
- Adobe Acrobat Standard 7.0.1
- Adobe Acrobat Standard 7.0.2
- Adobe Acrobat Standard 7.0.3
- Adobe Acrobat Standard 7.0.4
- Adobe Acrobat Standard 7.0.5
- Adobe Acrobat Standard 7.0.6
- Adobe Acrobat Standard 7.0.7
- Adobe Acrobat Standard 7.0.8
- Adobe Acrobat Standard 7.1
- Adobe Acrobat Standard 7.1.1
- Adobe Acrobat Standard 8.0
- Adobe Acrobat Standard 8.1
- Adobe Acrobat Standard 8.1.1
- Adobe Acrobat Standard 8.1.2
- Adobe Acrobat Standard 8.1.3
- Adobe Acrobat Standard 8.1.4
- Adobe Acrobat Standard 9
- Adobe Acrobat Standard 9.1
- Adobe Reader 7.0.0
- Adobe Reader 7.0.1
- Adobe Reader 7.0.2
- Adobe Reader 7.0.3
- Adobe Reader 7.0.4
- Adobe Reader 7.0.5
- Adobe Reader 7.0.6
- Adobe Reader 7.0.7
- Adobe Reader 7.0.8
- Adobe Reader 7.0.9
- Adobe Reader 7.1
- Adobe Reader 7.1.1
- Adobe Reader 7.1.2
- Adobe Reader 8.0
- Adobe Reader 8.1
- Adobe Reader 8.1.1
- Adobe Reader 8.1.2
- Adobe Reader 8.1.2 Security Update 1
- Adobe Reader 8.1.3
- Adobe Reader 8.1.4
- Adobe Reader 8.1.5
- Adobe Reader 9
- Adobe Reader 9.1
- Adobe Reader 9.1.1
- Avaya Interactive Response 3.0
- Avaya Interactive Response 4.0
- Gentoo Linux
- Nortel Networks Self-Service MPS 1000
- Nortel Networks Self-Service MPS 500
- Nortel Networks Self-Service Peri Application
- Nortel Networks Self-Service Speech Server
- Red Hat Desktop Extras 3
- Red Hat Desktop Extras 4
- Red Hat Enterprise Linux AS Extras 3
- Red Hat Enterprise Linux AS Extras 4
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Red Hat Enterprise Linux ES Extras 3
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux Extras 3
- Red Hat Enterprise Linux Extras 4
- Red Hat Enterprise Linux Supplementary 5 Server
- Red Hat Enterprise Linux WS Extras 3
- Red Hat Enterprise Linux WS Extras 4
- Sun Solaris 10 Sparc
- SuSE openSUSE 10.3
- SuSE openSUSE 11.0
- SuSE openSUSE 11.1
- SuSE SUSE Linux Enterprise 10
- SuSE SUSE Linux Enterprise 11
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- SuSE SUSE Linux Enterprise Desktop 11
- SuSE SUSE Linux Enterprise Server 11 DEBUGINFO
References