Adobe Reader and Acrobat Multiple Code Execution Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Adobe Reader and Acrobat, which could be exploited by attackers to bypass security restrictions, gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system.
1. Due to an integer overflow error in the U3D module when processing malformed data, which could be exploited by attackers to execute arbitrary code by tricking a user into opening a specially crafted PDF document.
2. Due to a use-after-free error within the "DocMedia.newPlayer()" function.
3. Due to a memory corruption error in the U3D module when processing malformed data, which could be exploited to execute arbitrary code.
4. Due to an error in 3D, which could allow attackers to load malicious DLLs and execute arbitrary code.
5. Due to an unspecified memory corruption, which could allow code execution.
6. Due to an unspecified script injection error.
7. Due to a NULL pointer dereference error, which could be exploited to cause a denial of service.
8. Due to a buffer overflow error in the Download Manager, which could be exploited to execute arbitrary code.
Impact
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Adobe Reader version 9.2 and prior
- Adobe Acrobat version 9.2 and prior
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to version 9.3 or 8.2.
- Adobe Reader:
http://get.adobe.com/reader - Acrobat Standard and Pro on Windows:
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows - Acrobat Pro Extended on Windows:
http://www.adobe.com/support/downloads/product.jsp?product=158&platform=Windows - Acrobat 3D on Windows:
http://www.adobe.com/support/downloads/product.jsp?product=112&platform=Windows - Acrobat Pro users on Macintosh:
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh
Vulnerability Identifier
- CVE-2009-3953
- CVE-2009-3954
- CVE-2009-3955
- CVE-2009-3956
- CVE-2009-3957
- CVE-2009-3958
- CVE-2009-3959
- CVE-2009-4324
Source
Related Link
Share with