Secunia Advisory SA37690

Adobe Reader/Acrobat Multiple Vulnerabilities
Secunia Advisory SA37690
Release Date 2009-12-15
Last Update 2010-01-14
   
Popularity 30,284 views

Criticality level Extremely criticalExtremely critical
Impact Cross Site Scripting
System access
Where From remote
Authentication level Available in Customer Area
   
Report reliability Available in Customer Area
Solution Status Vendor Patch
   
Secunia PoC Available in Customer Area
Secunia analysis Available in Customer Area
   
3rd party PoC/exploit Link available in Customer Area
Systems affected Available in Customer Area
Approve distribution Available in Customer Area
Remediation status Secunia CSI, Secunia PSI
Automated scanning Secunia CSI, Secunia PSI
   
Software:Adobe Acrobat 3D 8.x
Adobe Acrobat 8 Professional
Adobe Acrobat 8.x
Adobe Acrobat 9.x
Adobe Reader 8.x
Adobe Reader 9.x

Secunia CVSS Score Available in Customer Area
CVE Reference(s) CVE-2009-3953 CVSS available in Customer Area
CVE-2009-3954 CVSS available in Customer Area
CVE-2009-3955 CVSS available in Customer Area
CVE-2009-3956 CVSS available in Customer Area
CVE-2009-3959 CVSS available in Customer Area
CVE-2009-4324 CVSS available in Customer Area
  

Description
Some vulnerabilities have been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system.

1) An error in the implementation of the "Doc.media.newPlayer()" JavaScript method can be exploited to corrupt memory and execute arbitrary code via a specially crafted PDF file.

NOTE: This vulnerability is currently being actively exploited.

2) An array indexing error exists in 3difr.x3d when processing U3D CLOD Mesh Declaration blocks. This can potentially be exploited to corrupt memory and execute arbitrary code via a PDF file containing a specially crafted U3D model.

3) An error in the 3D implementation when loading DLLs can be exploited to potentially execute arbitrary code.

4) A sign extension error exists when processing a Jp2c stream of a JpxDecode data stream. This can be exploited to corrupt memory and potentially execute arbitrary code via a specially crafted JPC_MS_RGN marker.

5) An error when processing Forms Data Format (FDF) files can be exploited to execute arbitrary JavaScript code in a user's browser session in context of a site hosting a target PDF file.

6) An integer overflow error in the U3D implementation can be exploited to potentially execute arbitrary code.

The vulnerabilities are reported in version 9.2 and prior.

Solution
Update to version 8.2 or 9.3.
Further details available in Customer Area

Provided and/or discovered by
1) Reported as a 0-day.
2) Originally reported by Felipe Andres Manzano in versions prior to 9.2. Reported in version 9.2 by Parvez Anwar.
4) Code Audit Labs, reported via iDefense
5) Paul Theriault, stratsec

The vendor also credits:
3) Greg MacManus of iSIGHT Partners Labs
6) Nicolas Joly of Vupen

Changelog
Further details available in Customer Area

Original Advisory
Adobe:
http://www.adobe.com/support/security/advisories/apsa09-07.html
http://www.adobe.com/support/security/bulletins/apsb10-02.html
http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html

Felipe Andres Manzano:
http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/adobe_u3d_meshdecl.rb

iDefense:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=836

stratsec:
http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0245.html

Deep Links
Links available in Customer Area


Discuss this advisory
A new thread in our forum is automatically created for each posted Secunia Advisory. Activate the thread by commenting/discussing below.
Subject: Adobe Reader/Acrobat Multiple Vulnerabilities
 
No posts yet

-

You must be logged in to post a comment.



footer
© 2002-2010 Secunia ApS • Weidekampsgade 14A, Copenhagen, Denmark • +45 7020 5144 • info@secunia.com
Terms & Conditions and CopyrightReport vulnerability
CVE logo OTA logo First logo