TippingPoint Zero Day Initiative

Adobe Acrobat getIcon() Stack Overflow Vulnerability

ZDI-09-014: March 24th, 2009


Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 6255. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat and Adobe Reader. User interaction is required in that a user must visit a malicious web site or open a malicious file.

The specific flaw exists when processing malicious JavaScript contained in a PDF document. When supplying a specially crafted argument to the getIcon() method of a Collab object, proper bounds checking is not performed resulting in a stack overflow. If successfully exploited full control of the affected machine running under the credentials of the currently logged in user can be achieved.

Vendor Response

Adobe has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2008-07-03 - Vulnerability reported to vendor
    2009-03-24 - Coordinated public release of advisory


This vulnerability was discovered by:
    Tenable Network Security