Short Name |
HTTP:STC:ADOBE:READER-IT
|
Severity |
High
|
Recommended |
No
|
Recommended Action |
Drop
|
Category |
HTTP
|
Keywords |
Adobe Reader Free Text Annotation with Invalid Intent (IT) Value Remote Code Execution
|
Release Date |
2012/09/19
|
Update Number |
2186
|
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+
|
HTTP: Adobe Reader Free Text Annotation with Invalid Intent (IT) Value Remote Code Execution
This signature detects attempts to exploit a known vulnerability against Adobe Reader. A successful attack can lead to arbitrary code execution.
Extended Description
Adobe Acrobat and Reader are prone to a remote memory corruption vulnerability.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions.
Affected Products
- Adobe Acrobat 10.0
- Adobe Acrobat 10.0.1
- Adobe Acrobat 10.0.2
- Adobe Acrobat 10.0.3
- Adobe Acrobat 10.1
- Adobe Acrobat 10.1.1
- Adobe Acrobat 10.1.2
- Adobe Acrobat 10.1.3
- Adobe Acrobat 9
- Adobe Acrobat 9.1.1
- Adobe Acrobat 9.2
- Adobe Acrobat 9.3
- Adobe Acrobat 9.3.1
- Adobe Acrobat 9.3.2
- Adobe Acrobat 9.3.3
- Adobe Acrobat 9.3.3
- Adobe Acrobat 9.3.4
- Adobe Acrobat 9.3.4
- Adobe Acrobat 9.4
- Adobe Acrobat 9.4.1
- Adobe Acrobat 9.4.2
- Adobe Acrobat 9.4.3
- Adobe Acrobat 9.4.4
- Adobe Acrobat 9.4.5
- Adobe Acrobat 9.4.6
- Adobe Acrobat 9.4.7
- Adobe Acrobat 9.5
- Adobe Acrobat 9.5.1
- Adobe Reader 10.0
- Adobe Reader 10.0.1
- Adobe Reader 10.0.2
- Adobe Reader 10.0.3
- Adobe Reader 10.1
- Adobe Reader 10.1.1
- Adobe Reader 10.1.2
- Adobe Reader 10.1.3
- Adobe Reader 9.4
- Adobe Reader 9.4.1
- Adobe Reader 9.4.2
- Adobe Reader 9.4.3
- Adobe Reader 9.4.4
- Adobe Reader 9.4.5
- Adobe Reader 9.4.6
- Adobe Reader 9.4.7
- Adobe Reader 9.5
- Adobe Reader 9.5.1
References