Adobe Reader/Acrobat JBIG2 Stream Array Indexing Vulnerability
|
Secunia Advisory:
|
SA33901
|
|
Release Date:
|
2009-02-20
|
Last Update:
|
2009-03-11
|
Popularity:
|
15,764 views
|
|
Critical:
|
Extremely critical
|
Impact:
|
System access
|
Where:
|
From remote
|
Solution Status:
|
Partial Fix
|
|
Software: | Adobe Acrobat 7 Professional Adobe Acrobat 7.x Adobe Acrobat 8 Professional Adobe Acrobat 8.x Adobe Acrobat 9.x Adobe Reader 7.x Adobe Reader 8.x Adobe Reader 9.x
|
|
Binary Analysis:
|
BA680 :: Available for 2 Credits
|
|
Subscribe:
|
Instant alerts on relevant vulnerabilities
|
|
Advisory Content (Page 1 of 3) | [ 1 ] [ 2 ] [ 3 ] | |
|
Description: A vulnerability has been reported in Adobe Reader/Acrobat, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an array indexing error in the processing of JBIG2 streams. This can be exploited to corrupt arbitrary memory via a specially crafted PDF file.
Successful exploitation allows execution of arbitrary code.
NOTE: Reportedly, the vulnerability is currently being actively exploited.
Change Page: [ 1 ] [ 2 ] [ 3 ]
|
|
Track this Secunia Advisory
|
Customers of the Secunia Vulnerability Intelligence solutions will automatically receive updates when new information regarding this advisory is released.
Read more about our Vulnerability Intelligence solutions and what they can do for you and your company.
|
|
About this Secunia Advisory
|
Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.
Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
|