Lucene search

K
gentooGentoo FoundationGLSA-200412-12
HistoryDec 16, 2004 - 12:00 a.m.

Adobe Acrobat Reader: Buffer overflow vulnerability

2004-12-1600:00:00
Gentoo Foundation
security.gentoo.org
12

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.106 Low

EPSS

Percentile

95.1%

Background

Adobe Acrobat Reader is a utility used to view PDF files.

Description

A buffer overflow has been discovered in the email processing of Adobe Acrobat Reader. This flaw exists in the mailListIsPdf function, which checks if the input file is an email message containing a PDF file.

Impact

A remote attacker could send the victim a specially-crafted email and PDF attachment, which would trigger the buffer overflow and possibly lead to the execution of arbitrary code with the permissions of the user running Adobe Acrobat Reader.

Workaround

There is no known workaround at this time.

Resolution

All Adobe Acrobat Reader users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-text/acroread-5.10"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-text/acroread< 5.10UNKNOWN

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.106 Low

EPSS

Percentile

95.1%