Secunia Advisory SA41340Adobe Reader / Acrobat Font Parsing Buffer Overflow Vulnerability
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
A vulnerability has been discovered in Adobe Reader, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the font parsing in CoolType.dll and can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into opening a specially crafted PDF file. The vulnerability is confirmed in versions 8.2.4 and 9.3.4. Other versions may also be affected. NOTE: The vulnerability is currently being actively exploited. Solution Provided and/or discovered by Deep Links Do you have additional information related to this advisory?Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Ubuntu update for mountall | |
| FestOS Multiple Vulnerabilities | |