Advisory Details

March 24th, 2009

Adobe Acrobat getIcon() Stack Overflow Vulnerability

ZDI-09-014
ZDI-CAN-362

CVE ID CVE-2009-0927
CVSS SCORE
AFFECTED VENDORS Adobe
AFFECTED PRODUCTS Acrobat
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['6255']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat and Adobe Reader. User interaction is required in that a user must visit a malicious web site or open a malicious file.

The specific flaw exists when processing malicious JavaScript contained in a PDF document. When supplying a specially crafted argument to the getIcon() method of a Collab object, proper bounds checking is not performed resulting in a stack overflow. If successfully exploited full control of the affected machine running under the credentials of the currently logged in user can be achieved.

ADDITIONAL DETAILS Adobe has issued an update to correct this vulnerability. More details can be found at:
http://www.adobe.com/support/security/bulletins/apsb09-04.html
DISCLOSURE TIMELINE
  • 2008-07-03 - Vulnerability reported to vendor
  • 2009-03-24 - Coordinated public release of advisory
CREDIT Tenable Network Security
BACK TO ADVISORIES