Short Name |
HTTP:STC:DL:PDF-U3D-CLOD
|
Severity |
High
|
Recommended |
No
|
Recommended Action |
Drop
|
Category |
HTTP
|
Keywords |
Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow
|
Release Date |
2010/10/25
|
Update Number |
1798
|
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+
|
HTTP: Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow
This signature detects attempts to exploit a known buffer overflow vulnerability in Adobe Acrobat Reader. It is due to an integer overflow when processing the "Shading Count" field in the CLOD Mesh Declaration block. This can be exploited by remote attackers to execute arbitrary code on the system by enticing a user to open a maliciously crafted PDF document. In a successful attack, the injected code runs within the security context of the currently logged in user. In an unsuccessful attack, the affected application can terminate abnormally leading to a denial-of-service condition.
Extended Description
Adobe Acrobat and Reader are prone to a heap-based buffer-overflow vulnerability because they fail to properly validate user-supplied input.
Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Failed exploit attempts will result in a denial of service.
The following products are affected:
Adobe Reader 9.3.1 and prior for Windows, Macintosh, and UNIX
Adobe Acrobat 9.3.1 and prior for Windows and Macintosh
Adobe Reader 8.2.1 and prior for Windows and Macintosh
Acrobat 8.2.1 and prior for Windows and Macintosh
Note: This vulnerability was previously documented in BID 39329 (Adobe Acrobat and Reader April 2010 Multiple Remote Vulnerabilities) but has been given its own record to better document the issue.
Affected Products
- Adobe Acrobat 9.1.1
- Adobe Acrobat 9.2
- Adobe Acrobat 9.3
- Adobe Acrobat 9.3.1
- Adobe Acrobat Professional 8.0
- Adobe Acrobat Professional 8.1
- Adobe Acrobat Professional 8.1.1
- Adobe Acrobat Professional 8.1.2
- Adobe Acrobat Professional 8.1.2 Security Update 1
- Adobe Acrobat Professional 8.1.3
- Adobe Acrobat Professional 8.1.4
- Adobe Acrobat Professional 8.1.6
- Adobe Acrobat Professional 8.1.7
- Adobe Acrobat Professional 8.2
- Adobe Acrobat Professional 8.2.1
- Adobe Acrobat Professional 9.3
- Adobe Acrobat Professional 9.3.1
- Adobe Acrobat Standard 8.0
- Adobe Acrobat Standard 8.1
- Adobe Acrobat Standard 8.1.1
- Adobe Acrobat Standard 8.1.2
- Adobe Acrobat Standard 8.1.3
- Adobe Acrobat Standard 8.1.4
- Adobe Acrobat Standard 8.1.6
- Adobe Acrobat Standard 8.1.7
- Adobe Acrobat Standard 8.2
- Adobe Acrobat Standard 8.2.1
- Adobe Acrobat Standard 9
- Adobe Acrobat Standard 9.1
- Adobe Acrobat Standard 9.1.2
- Adobe Acrobat Standard 9.1.3
- Adobe Acrobat Standard 9.2
- Adobe Acrobat Standard 9.3
- Adobe Acrobat Standard 9.3.1
- Adobe Reader 8.0
- Adobe Reader 8.1
- Adobe Reader 8.1.1
- Adobe Reader 8.1.2
- Adobe Reader 8.1.2 Security Update 1
- Adobe Reader 8.1.3
- Adobe Reader 8.1.4
- Adobe Reader 8.1.5
- Adobe Reader 8.1.6
- Adobe Reader 8.1.7
- Adobe Reader 8.2
- Adobe Reader 8.2.1
- Adobe Reader 9
- Adobe Reader 9.1
- Adobe Reader 9.1.1
- Adobe Reader 9.1.2
- Adobe Reader 9.1.3
- Adobe Reader 9.2
- Adobe Reader 9.3
- Adobe Reader 9.3.1
- Gentoo Linux
- Red Hat Desktop Extras 4
- Red Hat Enterprise Linux AS Extras 4
- Red Hat Enterprise Linux Desktop Supplementary 5 Client
- Red Hat Enterprise Linux ES Extras 4
- Red Hat Enterprise Linux Extras 4
- Red Hat Enterprise Linux Supplementary 5 Server
- Red Hat Enterprise Linux WS Extras 4
- SuSE openSUSE 11.0
- SuSE openSUSE 11.1
- SuSE openSUSE 11.2
- SuSE SUSE Linux Enterprise Desktop 10 SP2
- SuSE SUSE Linux Enterprise Desktop 10 SP3
- SuSE SUSE Linux Enterprise Desktop 11
References