Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:ADOBE:CVE-2010-0195-CE

Severity

High

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Adobe Acrobat TrueType Font Handling Remote Code Execution

Release Date

2015/06/08

Update Number

2503

Supported Platforms

idp-4.1+, isg-3.5.141421+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Adobe Acrobat TrueType Font Handling Remote Code Execution


This signature detects attempts to exploit a known vulnerability against Adobe Acrobat and Reader. A successful attack can lead to arbitrary code execution.

Extended Description

Adobe Acrobat and Reader are prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. The following products are affected: Adobe Reader 9.3.1 and prior for Windows, Macintosh, and UNIX Adobe Acrobat 9.3.1 and prior for Windows and Macintosh Adobe Reader 8.2.1 and prior for Windows and Macintosh Acrobat 8.2.1 and prior for Windows and Macintosh NOTE: This issue was originally documented in BID 39329 (Adobe Acrobat and Reader April 2010 Multiple Remote Vulnerabilities); it has been assigned its own BID to better document the vulnerability.

Affected Products

  • Adobe Acrobat 9.1.1
  • Adobe Acrobat 9.2
  • Adobe Acrobat 9.3
  • Adobe Acrobat 9.3.1
  • Adobe Acrobat Professional 8.1
  • Adobe Acrobat Professional 8.1.1
  • Adobe Acrobat Professional 8.1.2
  • Adobe Acrobat Professional 8.1.2 Security Update 1
  • Adobe Acrobat Professional 8.1.3
  • Adobe Acrobat Professional 8.1.4
  • Adobe Acrobat Professional 8.1.6
  • Adobe Acrobat Professional 8.1.7
  • Adobe Acrobat Professional 8.2
  • Adobe Acrobat Professional 8.2.1
  • Adobe Acrobat Professional 9
  • Adobe Acrobat Professional 9.1
  • Adobe Acrobat Professional 9.1.2
  • Adobe Acrobat Professional 9.1.3
  • Adobe Acrobat Professional 9.2
  • Adobe Acrobat Professional 9.3
  • Adobe Acrobat Professional 9.3.1
  • Adobe Acrobat Standard 8.0
  • Adobe Acrobat Standard 8.1
  • Adobe Acrobat Standard 8.1.1
  • Adobe Acrobat Standard 8.1.2
  • Adobe Acrobat Standard 8.1.3
  • Adobe Acrobat Standard 8.1.4
  • Adobe Acrobat Standard 8.1.6
  • Adobe Acrobat Standard 8.1.7
  • Adobe Acrobat Standard 8.2
  • Adobe Acrobat Standard 8.2.1
  • Adobe Acrobat Standard 9
  • Adobe Acrobat Standard 9.1
  • Adobe Acrobat Standard 9.1.2
  • Adobe Acrobat Standard 9.1.3
  • Adobe Acrobat Standard 9.2
  • Adobe Acrobat Standard 9.3
  • Adobe Acrobat Standard 9.3.1
  • Adobe Reader 8.0
  • Adobe Reader 8.1
  • Adobe Reader 8.1.1
  • Adobe Reader 8.1.2
  • Adobe Reader 8.1.2 Security Update 1
  • Adobe Reader 8.1.3
  • Adobe Reader 8.1.4
  • Adobe Reader 8.1.5
  • Adobe Reader 8.1.6
  • Adobe Reader 8.1.7
  • Adobe Reader 8.2
  • Adobe Reader 8.2.1
  • Adobe Reader 9
  • Adobe Reader 9.1
  • Adobe Reader 9.1.1
  • Adobe Reader 9.1.2
  • Adobe Reader 9.1.3
  • Adobe Reader 9.2
  • Adobe Reader 9.3
  • Adobe Reader 9.3.1
  • Gentoo Linux
  • Red Hat Desktop Extras 4
  • Red Hat Enterprise Linux AS Extras 4
  • Red Hat Enterprise Linux Desktop Supplementary 5 Client
  • Red Hat Enterprise Linux ES Extras 4
  • Red Hat Enterprise Linux Extras 4
  • Red Hat Enterprise Linux Supplementary 5 Server
  • Red Hat Enterprise Linux WS Extras 4
  • SuSE openSUSE 11.0
  • SuSE openSUSE 11.1
  • SuSE openSUSE 11.2
  • SuSE SUSE Linux Enterprise Desktop 10 SP2
  • SuSE SUSE Linux Enterprise Desktop 10 SP3
  • SuSE SUSE Linux Enterprise Desktop 11

References

  • BugTraq: 39417
  • CVE: CVE-2010-0195

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out