Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

MISC:PDF:INTEGER-OVERFLOW

Severity

High

Recommended

No

Category

MISC

Release Date

2011/08/11

Update Number

1972

Supported Platforms

srx-10.0+

PDF Deflate Parameter Integer Overflow


Anomaly to detect Deflate Parameter Integer Overflow in PDF documents.

Extended Description

Adobe Acrobat Reader is prone to a remote code-execution vulnerability. An attacker can exploit this issue by supplying a malicious PDF file. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions.

Affected Products

  • Adobe Acrobat 7.0.0
  • Adobe Acrobat 7.0.1
  • Adobe Acrobat 7.0.2
  • Adobe Acrobat 7.0.3
  • Adobe Acrobat 9.1.1
  • Adobe Acrobat Professional 7.0.0
  • Adobe Acrobat Professional 7.0.1
  • Adobe Acrobat Professional 7.0.2
  • Adobe Acrobat Professional 7.0.3
  • Adobe Acrobat Professional 7.0.4
  • Adobe Acrobat Professional 7.0.5
  • Adobe Acrobat Professional 7.0.6
  • Adobe Acrobat Professional 7.0.7
  • Adobe Acrobat Professional 7.0.8
  • Adobe Acrobat Professional 7.0.9
  • Adobe Acrobat Professional 7.1
  • Adobe Acrobat Professional 7.1.1
  • Adobe Acrobat Professional 7.1.3
  • Adobe Acrobat Professional 8.0
  • Adobe Acrobat Professional 8.1
  • Adobe Acrobat Professional 8.1.1
  • Adobe Acrobat Professional 8.1.2
  • Adobe Acrobat Professional 8.1.2 Security Update 1
  • Adobe Acrobat Professional 8.1.3
  • Adobe Acrobat Professional 8.1.4
  • Adobe Acrobat Professional 8.1.6
  • Adobe Acrobat Professional 9
  • Adobe Acrobat Professional 9.1
  • Adobe Acrobat Professional 9.1.2
  • Adobe Acrobat Professional 9.1.3
  • Adobe Acrobat Standard 7.0.0
  • Adobe Acrobat Standard 7.0.1
  • Adobe Acrobat Standard 7.0.2
  • Adobe Acrobat Standard 7.0.3
  • Adobe Acrobat Standard 7.0.4
  • Adobe Acrobat Standard 7.0.5
  • Adobe Acrobat Standard 7.0.6
  • Adobe Acrobat Standard 7.0.7
  • Adobe Acrobat Standard 7.0.8
  • Adobe Acrobat Standard 7.1
  • Adobe Acrobat Standard 7.1.1
  • Adobe Acrobat Standard 7.1.3
  • Adobe Acrobat Standard 8.0
  • Adobe Acrobat Standard 8.1
  • Adobe Acrobat Standard 8.1.1
  • Adobe Acrobat Standard 8.1.2
  • Adobe Acrobat Standard 8.1.3
  • Adobe Acrobat Standard 8.1.4
  • Adobe Acrobat Standard 8.1.6
  • Adobe Acrobat Standard 9
  • Adobe Acrobat Standard 9.1
  • Adobe Acrobat Standard 9.1.2
  • Adobe Acrobat Standard 9.1.3
  • Adobe Reader 7.0.0
  • Adobe Reader 7.0.1
  • Adobe Reader 7.0.2
  • Adobe Reader 7.0.3
  • Adobe Reader 7.0.4
  • Adobe Reader 7.0.5
  • Adobe Reader 7.0.6
  • Adobe Reader 7.0.7
  • Adobe Reader 7.0.8
  • Adobe Reader 7.0.9
  • Adobe Reader 7.1
  • Adobe Reader 7.1.1
  • Adobe Reader 7.1.2
  • Adobe Reader 8.0
  • Adobe Reader 8.1
  • Adobe Reader 8.1.1
  • Adobe Reader 8.1.2
  • Adobe Reader 8.1.2 Security Update 1
  • Adobe Reader 8.1.3
  • Adobe Reader 8.1.4
  • Adobe Reader 8.1.5
  • Adobe Reader 8.1.6
  • Adobe Reader 9
  • Adobe Reader 9.1
  • Adobe Reader 9.1.1
  • Adobe Reader 9.1.2
  • Adobe Reader 9.1.3
  • Gentoo Linux
  • Red Hat Desktop Extras 3
  • Red Hat Desktop Extras 4
  • Red Hat Enterprise Linux AS Extras 3
  • Red Hat Enterprise Linux AS Extras 4
  • Red Hat Enterprise Linux Desktop Supplementary 5 Client
  • Red Hat Enterprise Linux ES Extras 3
  • Red Hat Enterprise Linux ES Extras 4
  • Red Hat Enterprise Linux Extras 3
  • Red Hat Enterprise Linux Extras 4
  • Red Hat Enterprise Linux Supplementary 5 Server
  • Red Hat Enterprise Linux WS Extras 3
  • Red Hat Enterprise Linux WS Extras 4
  • Sun Solaris 10 Sparc
  • SuSE openSUSE 10.3
  • SuSE openSUSE 11.0
  • SuSE openSUSE 11.1
  • SuSE SUSE Linux Enterprise Desktop 10 SP2
  • SuSE SUSE Linux Enterprise Desktop 10 SP3
  • SuSE SUSE Linux Enterprise Desktop 11

References

  • BugTraq: 36600
  • CVE: CVE-2009-3459

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out