Lucene search

K
certCERTVU:31554
HistoryNov 02, 2000 - 12:00 a.m.

Adobe Acrobat products have buffer overflow in the CIDFont /Registry and /Ordering entries

2000-11-0200:00:00
www.kb.cert.org
15

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.6%

Overview

By embedding malicious code in a Portable Document Format (PDF) file, an attacker can cause arbitrary code to execute on the victim’s system.

Description

The Adobe Acrobat PDF file format facility for specifying fonts contains buffer overflows in the /Registry and /Ordering entries. Each of these entries are not properly bounds checked, allowing at attacker to construct a malicious document which overflows an internal buffer and allows the execution of arbitary code.

These entries are in the CIDSystemInfo dictionary. CID stands for “character identifier”. The /Registry entry is for specifying which organization issued the character collection. For example “Adobe”. The /Ordering entry is supposed to uniquely identify a character collection issued by the registry. An example could be “Japan1”. More information about the PDF document format is available in the “Portable Document Format Reference Manual” from Adobe.


Impact

An attacker could execute arbitrary code on systems running a vulnerable Adobe product when the user views a malicious PDF file.


Solution

Apply a patch

Adobe released Version 4.05 Update 2, which corrects this problem:

<http://www.adobe.com/misc/pdfsecurity.html&gt;

Vendor Information

31554

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Adobe __ Affected

Updated: November 02, 2000

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Adobe has a statement regarding this vulnerability at:

<http://www.adobe.com/misc/pdfsecurity.html&gt;
Adobe Acrobat Version 4.05 Update 2 corrects the problem.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%2331554 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This document was written by Cory F Cohen.

Other Information

CVE IDs: CVE-2000-0713
Severity Metric: 5.00 Date Public:

7.6 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.6%

Related for VU:31554