Security > Security Alerts & Briefings
Adobe Acrobat / Reader Plug-in Buffer Overflow Vulnerability
(1/1)
Corrine:
TITLE: Adobe Acrobat / Reader Plug-in Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA16466
RELEASE DATE: 2005-08-16
LAST UPDATE: 2005-08-17
VERIFY ADVISORY: http://secunia.com/advisories/16466/
CRITICAL: Highly critical
WHERE: From remote
IMPACT: System access
SOFTWARE:
Adobe Acrobat 5.x
Adobe Acrobat 6.x
Adobe Acrobat 7.x
Adobe Acrobat Reader 5.x
Adobe Reader 6.x
Adobe Reader 7.x
DESCRIPTION: A vulnerability has been reported in Adobe Reader and Adobe Acrobat, which potentially can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an unspecified boundary error in the core application plug-in and can be exploited to cause a buffer overflow when a specially crafted file is opened.
Successful exploitation may allow execution of arbitrary code.
SOLUTION: Install updated version.
Adobe Reader (Windows or Mac OS): Update to version 7.0.3 or 6.0.4.
Adobe Reader (Linux or Solaris): Update to version 7.0.1.
Adobe Acrobat (Windows or Mac OS): Update to version 7.0.3, 6.0.4, or 5.0.10.
REPORTED BY CREDITS: Reported by vendor.
CHANGELOG: 2005-08-17: Added link to US-CERT vulnerability note.
ORIGINAL ADVISORY: Adobe: http://www.adobe.com/support/techdocs/321644.html
OTHER REFERENCES: US-CERT VU#896220: http://www.kb.cert.org/vuls/id/896220
Source: http://secunia.com/advisories/16466/
Navigation
[0] Message Index
Go to full version