Short Name |
HTTP:STC:DL:EPS-DSC-BOF |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Adobe Illustrator EPS File DSC Comment Buffer Overflow |
Release Date |
2011/01/13 |
Update Number |
1848 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known buffer overflow vulnerability in Adobe Illustrator software. It is due to a boundary error while parsing Encapsulated Postscript (.eps) files containing an overly long DSC comment value. Remote attackers can exploit this by enticing target users to open a crafted EPS file with a vulnerable version of the affected product. A successful attack can result in arbitrary code execution with the privileges of the logged in user. In an unsuccessful attack, the behavior of the vulnerable application appears unchanged.
Adobe Illustrator is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. An attacker can exploit this issue by enticing an unsuspecting victim to open a malicious Encapsulated PostScript file. Successfully exploiting this issue will allow attackers to execute arbitrary code with the privileges of the user running the affected application. Failed exploit attempts will likely result in a denial-of-service condition. This issue affects Illustrator CS4 14.0.0 and CS3 13.0.0; other versions may also be affected.