Secunia Advisory SA37690Adobe Reader/Acrobat Multiple Vulnerabilities
|
||||
Description
Some vulnerabilities have been reported in Adobe Reader and Acrobat, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a user's system. 1) An error in the implementation of the "Doc.media.newPlayer()" JavaScript method can be exploited to corrupt memory and execute arbitrary code via a specially crafted PDF file. NOTE: This vulnerability is currently being actively exploited. 2) An array indexing error exists in 3difr.x3d when processing U3D CLOD Mesh Declaration blocks. This can potentially be exploited to corrupt memory and execute arbitrary code via a PDF file containing a specially crafted U3D model. 3) An error in the 3D implementation when loading DLLs can be exploited to potentially execute arbitrary code. 4) A sign extension error exists when processing a Jp2c stream of a JpxDecode data stream. This can be exploited to corrupt memory and potentially execute arbitrary code via a specially crafted JPC_MS_RGN marker. 5) An error when processing Forms Data Format (FDF) files can be exploited to execute arbitrary JavaScript code in a user's browser session in context of a site hosting a target PDF file. 6) An integer overflow error in the U3D implementation can be exploited to potentially execute arbitrary code. The vulnerabilities are reported in version 9.2 and prior. Solution Provided and/or discovered by Deep Links Discuss this advisoryA new thread in our forum is automatically created for each posted Secunia Advisory. Activate the thread by commenting/discussing below.
|
||||