This site is deprecated. Please
CLICK HERE for latest updates
Short Name |
HTTP:STC:ADOBE:PDF-U3D-BO
|
Severity |
Major
|
Recommended |
No
|
Recommended Action |
Drop
|
Category |
HTTP
|
Keywords |
PDF U3D RHAdobeMeta Buffer Overflow
|
Release Date |
2010/09/29
|
Update Number |
1782
|
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+
|
HTTP: PDF U3D RHAdobeMeta Buffer Overflow
This signature detects attempts to exploit a known vulnerability in Adobe Acrobat. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Extended Description
Adobe Reader and Acrobat are prone to a remote stack-based buffer-overflow vulnerability because they fail to adequately bounds-check user-supplied data.
An attacker can exploit this issue by tricking a victim into opening a malicious file to execute arbitrary code and to cause denial-of-service conditions.
NOTE: This issue was previously covered in BID 35274 (Adobe Reader and Acrobat 9.1.1 and Prior Multiple Remote Vulnerabilities), but has been assigned its own record to better document it.
Affected Products
- Adobe acrobat_professional 7.0.0
- Adobe acrobat_professional 7.0.1
- Adobe acrobat_professional 7.0.2
- Adobe acrobat_professional 7.0.3
- Adobe acrobat_professional 7.0.4
- Adobe acrobat_professional 7.0.5
- Adobe acrobat_professional 7.0.6
- Adobe acrobat_professional 7.0.7
- Adobe acrobat_professional 7.0.8
- Adobe acrobat_professional 7.0.9
- Adobe acrobat_professional 7.1
- Adobe acrobat_professional 7.1.1
- Adobe acrobat_professional 8.0
- Adobe acrobat_professional 8.1
- Adobe acrobat_professional 8.1.1
- Adobe acrobat_professional 8.1.2
- Adobe acrobat_professional 8.1.2 Security Update 1
- Adobe acrobat_professional 8.1.3
- Adobe acrobat_professional 8.1.4
- Adobe acrobat_standard 7.0.0
- Adobe acrobat_standard 7.0.1
- Adobe acrobat_standard 7.0.2
- Adobe acrobat_standard 7.0.3
- Adobe acrobat_standard 7.0.4
- Adobe acrobat_standard 7.0.5
- Adobe acrobat_standard 7.0.6
- Adobe acrobat_standard 7.0.7
- Adobe acrobat_standard 7.0.8
- Adobe acrobat_standard 7.1
- Adobe acrobat_standard 7.1.1
- Adobe acrobat_standard 8.0
- Adobe acrobat_standard 8.1
- Adobe acrobat_standard 8.1.1
- Adobe acrobat_standard 8.1.2
- Adobe acrobat_standard 8.1.3
- Adobe acrobat_standard 8.1.4
- Adobe acrobat_standard 9
- Adobe acrobat_standard 9.1
- Adobe reader 7.0.0
- Adobe reader 7.0.1
- Adobe reader 7.0.2
- Adobe reader 7.0.3
- Adobe reader 7.0.4
- Adobe reader 7.0.5
- Adobe reader 7.0.6
- Adobe reader 7.0.7
- Adobe reader 7.0.8
- Adobe reader 7.0.9
- Adobe reader 7.1
- Adobe reader 7.1.1
- Adobe reader 7.1.2
- Adobe reader 8.0
- Adobe reader 8.1
- Adobe reader 8.1.1
- Adobe reader 8.1.2
- Adobe reader 8.1.2 Security Update 1
- Adobe reader 8.1.3
- Adobe reader 8.1.4
- Adobe reader 8.1.5
- Adobe reader 9
- Adobe reader 9.1
- Adobe reader 9.1.1
- Avaya interactive_response 3.0
- Avaya interactive_response 4.0
- Gentoo linux
- Nortel_networks self-service_mps_1000
- Nortel_networks self-service_mps_500
- Nortel_networks self-service_peri_application
- Nortel_networks self-service_speech_server
- Red_hat desktop_extras 3
- Red_hat desktop_extras 4
- Red_hat enterprise_linux_as_extras 3
- Red_hat enterprise_linux_as_extras 4
- Red_hat enterprise_linux_desktop_supplementary 5 Client
- Red_hat enterprise_linux_es_extras 3
- Red_hat enterprise_linux_es_extras 4
- Red_hat enterprise_linux_extras 3
- Red_hat enterprise_linux_extras 4
- Red_hat enterprise_linux_supplementary 5 Server
- Red_hat enterprise_linux_ws_extras 3
- Red_hat enterprise_linux_ws_extras 4
- Sun solaris 10 Sparc
- Suse opensuse 10.3
- Suse opensuse 11.0
- Suse opensuse 11.1
- Suse suse_linux_enterprise 10
- Suse suse_linux_enterprise 11
- Suse suse_linux_enterprise_desktop 10 SP2
- Suse suse_linux_enterprise_desktop 11
- Suse suse_linux_enterprise_server 11 DEBUGINFO
References