Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:STC:ADOBE:PDF-JS-METHOD

Severity

High

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Adobe Multiple Products PDF JavaScript Method Buffer Overflow

Release Date

2010/09/24

Update Number

1779

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Adobe Multiple Products PDF JavaScript Method Buffer Overflow


This signature detects attempts to exploit a known vulnerability in multiple Adobe applications. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the process's user.

Extended Description

Adobe Acrobat and Reader are prone to multiple arbitrary remote code-execution and security vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected application. Other attacks are also possible. Versions prior to Adobe Acrobat and Adobe Reader 8.1.2 are vulnerable to these issues.

Affected Products

  • Adobe Acrobat 3D
  • Adobe Acrobat Professional 7.0.0
  • Adobe Acrobat Professional 7.0.1
  • Adobe Acrobat Professional 7.0.2
  • Adobe Acrobat Professional 7.0.3
  • Adobe Acrobat Professional 7.0.4
  • Adobe Acrobat Professional 7.0.5
  • Adobe Acrobat Professional 7.0.6
  • Adobe Acrobat Professional 7.0.7
  • Adobe Acrobat Professional 7.0.8
  • Adobe Acrobat Professional 8.0
  • Adobe Acrobat Professional 8.1
  • Adobe Acrobat Professional 8.1.1
  • Adobe Acrobat Standard 8.1.1
  • Adobe Reader 3.0.0
  • Adobe Reader 4.0.0
  • Adobe Reader 4.0.0 5
  • Adobe Reader 4.0.0 5c
  • Adobe Reader 4.0.5 A
  • Adobe Reader 5.0.0
  • Adobe Reader 5.0.10
  • Adobe Reader 5.0.5
  • Adobe Reader 5.1.0
  • Adobe Reader 6.0.0
  • Adobe Reader 6.0.1
  • Adobe Reader 6.0.2
  • Adobe Reader 6.0.3
  • Adobe Reader 6.0.4
  • Adobe Reader 7.0.0
  • Adobe Reader 7.0.1
  • Adobe Reader 7.0.2
  • Adobe Reader 7.0.3
  • Adobe Reader 7.0.4
  • Adobe Reader 7.0.5
  • Adobe Reader 7.0.6
  • Adobe Reader 7.0.7
  • Adobe Reader 7.0.8
  • Adobe Reader 7.0.9
  • Adobe Reader 8.0
  • Adobe Reader 8.1
  • Adobe Reader 8.1.1
  • Avaya Interactive Response 2.0
  • Avaya Interactive Response 3.0
  • Gentoo Linux 2007.0
  • Gentoo Linux
  • Nortel Networks Media Processing Svr 100
  • Nortel Networks Media Processing Svr 1000 Rel 3.0
  • Nortel Networks Media Processing Svr 500 Rel 3.0
  • Nortel Networks Self-Service
  • Nortel Networks Self-Service Media Processing Server
  • Nortel Networks Self-Service MPS 1000
  • Nortel Networks Self-Service MPS 500
  • Nortel Networks Self-Service Peri Application
  • Nortel Networks Self-Service - Peri Application Rel 3.0
  • Nortel Networks Self-Service Speech Server
  • Red Hat Enterprise Linux Desktop Supplementary 5 Client
  • Red Hat Enterprise Linux Extras 3
  • Red Hat Enterprise Linux Extras 4
  • Red Hat Enterprise Linux Supplementary 5 Server
  • Sun Solaris 10 Sparc
  • SuSE Linux Personal 10.1
  • SuSE Linux Professional 10.1
  • SuSE openSUSE 10.2
  • SuSE openSUSE 10.3
  • SuSE SUSE Linux Enterprise Desktop 10 SP1
  • SuSE SUSE Linux Enterprise SDK 10.SP1
  • SuSE SUSE Linux Enterprise Server 10 SP1

References

  • BugTraq: 27641
  • CVE: CVE-2007-5659

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out