Lucene search

K
saintSAINT CorporationSAINT:87E25D27930DA4EC4B02D093DE63B91E
HistorySep 17, 2010 - 12:00 a.m.

Adobe Reader CoolType.dll buffer overflow

2010-09-1700:00:00
SAINT Corporation
my.saintcorporation.com
81

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.596 Medium

EPSS

Percentile

97.8%

Added: 09/17/2010
CVE: CVE-2010-2883
BID: 43057
OSVDB: 67849

Background

Adobe Reader is free software for viewing PDF documents.

Problem

A buffer overflow in the CoolType.dll module allows command execution when a user opens a PDF document containing a long, specially crafted field in a SING table within a TrueType font.

Resolution

Apply the fix referenced in APSA10-02 when available.

References

<http://secunia.com/advisories/41340&gt;

Limitations

Exploit works on Adobe Reader 9.3.4 and requires a user to open the exploit file.

The IO::Uncompress and Compress::Zlib PERL modules must be installed on the SAINTexploit host in order to run this exploit.

Platforms

Windows

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.596 Medium

EPSS

Percentile

97.8%