Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:ADOBE:PDF-CATALOG

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Adobe Acrobat Reader PDF Catalog Handling Vulnerability

Release Date

2010/09/28

Update Number

1780

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Adobe Acrobat Reader PDF Catalog Handling Vulnerability


This signature detects attempts to exploit a known vulnerability against multiple products that parse the Portable Document Format (PDF). Attackers can craft a malicious document that can cause arbitrary code to be executed on the victim host.

Extended Description

Multiple PDF readers are prone to multiple remote buffer-overflow vulnerabilities because the applications fail to bounds-check user-supplied data before copying it into an insufficiently sized buffer. An attacker may be able exploit this issue to execute arbitrary code within the context of the affected application. In some circumstances, the vulnerability can be exploited only to cause a denial of service.

Affected Products

  • Adobe Acrobat Reader (UNIX) 4.0.0 5
  • Adobe Acrobat Reader (UNIX) 5.0.0
  • Adobe Acrobat Reader (UNIX) 5.0.0 5
  • Adobe Acrobat Reader (UNIX) 5.0.0 6
  • Adobe Acrobat Reader (UNIX) 5.0.0 7
  • Adobe Acrobat Reader (UNIX) 5.0.10
  • Adobe Acrobat Reader (UNIX) 5.0.11
  • Adobe Acrobat Reader (UNIX) 5.0.8
  • Adobe Acrobat Reader (UNIX) 5.0.9
  • Adobe Acrobat Reader (UNIX) 7.0.0
  • Adobe Acrobat Reader (UNIX) 7.0.1
  • Adobe Reader 3.0.0
  • Adobe Reader 4.0.0
  • Adobe Reader 4.0.0 5
  • Adobe Reader 4.0.0 5c
  • Adobe Reader 4.0.5 A
  • Adobe Reader 5.0.0
  • Adobe Reader 5.0.10
  • Adobe Reader 5.0.5
  • Adobe Reader 5.1.0
  • Adobe Reader 6.0.0
  • Adobe Reader 6.0.1
  • Adobe Reader 6.0.2
  • Adobe Reader 6.0.3
  • Adobe Reader 6.0.4
  • Adobe Reader 7.0.0
  • Adobe Reader 7.0.1
  • Adobe Reader 7.0.2
  • Adobe Reader 7.0.3
  • Adobe Reader 7.0.4
  • Adobe Reader 7.0.5
  • Adobe Reader 7.0.6
  • Adobe Reader 7.0.7
  • Adobe Reader 7.0.8
  • Apple Mac OS X Preview.app 3.0.8
  • KDE 3.2.0
  • KDE 3.2.1
  • KDE 3.2.2
  • KDE 3.2.3
  • KDE 3.3.0
  • KDE 3.3.1
  • KDE 3.3.2
  • KDE 3.4.0
  • KDE 3.4.1
  • KDE 3.4.2
  • KDE 3.4.3
  • KDE 3.5.0
  • KDE 3.5.1
  • KDE 3.5.2
  • KDE 3.5.3
  • KDE 3.5.4
  • KDE 3.5.5
  • KDE KOffice 1.2.0
  • KDE KOffice 1.2.1
  • KDE KOffice 1.2.92
  • KDE KOffice 1.3.0
  • KDE KOffice 1.3.0 Beta1
  • KDE KOffice 1.3.0 Beta2
  • KDE KOffice 1.3.0 Beta3
  • KDE KOffice 1.3.1
  • KDE KOffice 1.3.2
  • KDE KOffice 1.3.3
  • KDE KOffice 1.3.4
  • KDE KOffice 1.3.5
  • KDE KOffice 1.4.0
  • KDE KOffice 1.4.1
  • KDE KOffice 1.4.2
  • KDE KOffice 1.5.0
  • KDE KOffice 1.5.2
  • KDE KOffice 1.5.91
  • KDE KOffice 1.6.0
  • KDE KOffice 1.6.1
  • KDE kpdf 0.5.0
  • KDE kpdf 3.2.0
  • KDE kpdf 3.4.2
  • KDE kpdf 3.4.3
  • KDE kword 1.4.1
  • KDE kword 1.4.2
  • KDE kword 1.5.0
  • KDE kword 1.5.2
  • Mandriva Corporate Server 3.0.0
  • Mandriva Corporate Server 3.0.0 X86 64
  • Mandriva Corporate Server 4.0
  • Mandriva Corporate Server 4.0.0 X86 64
  • Mandriva Linux Mandrake 2006.0.0
  • Mandriva Linux Mandrake 2006.0.0 X86 64
  • Mandriva Linux Mandrake 2007.0
  • Mandriva Linux Mandrake 2007.0 X86 64
  • PDFTOHTML 0.32.0 A
  • PDFTOHTML 0.32.0 B
  • PDFTOHTML 0.33.0
  • PDFTOHTML 0.33.0 A
  • PDFTOHTML 0.34.0
  • PDFTOHTML 0.35.0
  • PDFTOHTML 0.36.0
  • Poppler poppler 0.4.1
  • Poppler poppler 0.4.2
  • Poppler poppler 0.5.1
  • Poppler poppler 0.5.3
  • Poppler poppler 0.5.4
  • rPath rPath Linux 1
  • SuSE Linux 10.0
  • SuSE Linux 10.1
  • SuSE Linux 9.1
  • SuSE Linux 9.2
  • SuSE Linux 9.3
  • SuSE SUSE Linux Enterprise Server 10
  • SuSE SUSE Linux Enterprise Server 9
  • teTeX 2.0.0
  • teTeX 2.0.1
  • teTeX 2.0.2
  • teTeX 3.0.0
  • Turbolinux Home
  • Turbolinux Multimedia
  • Turbolinux Personal
  • Turbolinux 10 F...
  • Turbolinux FUJI
  • Turbolinux Turbolinux Desktop 10.0.0
  • Turbolinux Turbolinux Server 10.0.0
  • Turbolinux Turbolinux Server 10.0.0 X64
  • Turbolinux Turbolinux Server 8.0.0
  • Ubuntu Ubuntu Linux 5.10.0 Amd64
  • Ubuntu Ubuntu Linux 5.10.0 I386
  • Ubuntu Ubuntu Linux 5.10.0 Powerpc
  • Ubuntu Ubuntu Linux 5.10.0 Sparc
  • Ubuntu Ubuntu Linux 6.06 LTS Amd64
  • Ubuntu Ubuntu Linux 6.06 LTS I386
  • Ubuntu Ubuntu Linux 6.06 LTS Powerpc
  • Ubuntu Ubuntu Linux 6.06 LTS Sparc
  • Ubuntu Ubuntu Linux 6.10 Amd64
  • Ubuntu Ubuntu Linux 6.10 I386
  • Ubuntu Ubuntu Linux 6.10 Powerpc
  • Ubuntu Ubuntu Linux 6.10 Sparc
  • Xpdf 3.0.0 0
  • Xpdf 3.0.0 1
  • Xpdf 3.0.0 1Pl1
  • Xpdf 3.0.0 Pl2
  • Xpdf 3.0.1 (Patch 2)

References

  • CVE: CVE-2007-0104
  • URL: http://projects.info-pull.com/moab/MOAB-06-01-2007.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out