This site is deprecated. Please
CLICK HERE for latest updates
Short Name |
HTTP:STC:ADOBE:PDF-JS-EXECUTION
|
Severity |
Major
|
Recommended |
No
|
Recommended Action |
Drop
|
Category |
HTTP
|
Keywords |
Adobe Reader and Acrobat Sandbox Policy Bypass
|
Release Date |
2014/09/08
|
Update Number |
2416
|
Supported Platforms |
idp-4.1+, isg-3.5.141818+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+
|
HTTP: Adobe Reader and Acrobat Sandbox Policy Bypass
This signature detects attempts to exploit a known vulnerability against Adobe Reader and Acrobat. A successful attack can lead to arbitrary code execution.
Extended Description
Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X do not properly implement JavaScript APIs, which allows remote attackers to obtain sensitive information via a crafted PDF document.
Affected Products
- Adobe acrobat 10.0
- Adobe acrobat 10.0.1
- Adobe acrobat 10.0.2
- Adobe acrobat 10.0.3
- Adobe acrobat 10.1
- Adobe acrobat 10.1.1
- Adobe acrobat 10.1.2
- Adobe acrobat 10.1.3
- Adobe acrobat 10.1.4
- Adobe acrobat 10.1.5
- Adobe acrobat 10.1.6
- Adobe acrobat 10.1.7
- Adobe acrobat 10.1.8
- Adobe acrobat 10.1.9
- Adobe acrobat 11.0
- Adobe acrobat 11.0.1
- Adobe acrobat 11.0.2
- Adobe acrobat 11.0.3
- Adobe acrobat 11.0.4
- Adobe acrobat 11.0.5
- Adobe acrobat 11.0.6
- Adobe acrobat_reader 10.0
- Adobe acrobat_reader 10.0.1
- Adobe acrobat_reader 10.0.2
- Adobe acrobat_reader 10.0.3
- Adobe acrobat_reader 10.1
- Adobe acrobat_reader 10.1.1
- Adobe acrobat_reader 10.1.2
- Adobe acrobat_reader 10.1.3
- Adobe acrobat_reader 10.1.4
- Adobe acrobat_reader 10.1.5
- Adobe acrobat_reader 10.1.6
- Adobe acrobat_reader 10.1.7
- Adobe acrobat_reader 10.1.8
- Adobe acrobat_reader 10.1.9
- Adobe acrobat_reader 11.0
- Adobe acrobat_reader 11.0.1
- Adobe acrobat_reader 11.0.2
- Adobe acrobat_reader 11.0.3
- Adobe acrobat_reader 11.0.4
- Adobe acrobat_reader 11.0.5
- Adobe acrobat_reader 11.0.6
References