Advisory Details

October 13th, 2015

Adobe Acrobat Reader DC app.launchURL Command Execution Remote Code Execution Vulnerability

ZDI-15-509
ZDI-CAN-3103

CVE ID CVE-2015-7614
CVSS SCORE 9, (AV:N/AC:M/Au:N/C:C/I:C/A:P)
AFFECTED VENDORS Adobe
AFFECTED PRODUCTS Acrobat Reader DC
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 20733. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Reader DC. Authentication is not required to exploit this vulnerability.

The specific flaw exists within handling URL's passed to app.launchURL. A specially crafted cURL passed to app.launchURL can force a command to be executed. A remote attacker could exploit this vulnerability to execute arbitrary code in the context of the process.

ADDITIONAL DETAILS Adobe has issued an update to correct this vulnerability. More details can be found at:
https://helpx.adobe.com/security/products/acrobat/apsb15-24.html
DISCLOSURE TIMELINE
  • 2015-07-28 - Vulnerability reported to vendor
  • 2015-10-13 - Coordinated public release of advisory
CREDIT AbdulAziz Hariri - HP Zero Day Initiative
BACK TO ADVISORIES