Lucene search

K
threatpostLindsey O'DonnellTHREATPOST:64E079F2EC1F4D520FBA77F2A6B58318
HistoryFeb 27, 2018 - 12:46 p.m.

Remote Code Execution Bug Patched in Adobe Acrobat Reader DC

2018-02-2712:46:07
Lindsey O'Donnell
threatpost.com
10

0.216 Low

EPSS

Percentile

96.0%

Researchers at Cisco Talos are detailing a remote code execution vulnerability found in Adobe Acrobat Reader DC that can be triggered when a malicious file is opened or a victim accesses a rigged webpage.

According to Talos, the vulnerability (CVE-2018-4901) was disclosed on Dec. 7 and Adobe issued a patch on Feb. 13. Researchers are now sharing the details of its discovery. Affected are Adobe Acrobat Reader versions 2018.009.20050 and 2017.011.30070 and earlier.

The vulnerability allows attackers to hide malicious JavaScript code in a PDF file. This code can enable document ID to perform unauthorized operations to trigger a stack-based buffer overflow when opening a specially crafted PDF document.

โ€œA specific Javascript script embedded in a PDF file can cause the document ID field to be used in an unbounded copy operation leading to stack-based buffer overflow when opening a specially crafted PDF document in Adobe Acrobat Reader,โ€ according to Talos.

Adobe rates the vulnerability with a โ€œpriority 2โ€, or as important, meaning that the bug presents an โ€œelevated riskโ€ and there are currently no known exploits in the wild.

โ€œAdobe Acrobat Reader is the most popular and most feature-rich PDF reader. It has a big user base, is usually a default PDF reader on systems and integrates into web browsers as a plugin for rendering PDFs,โ€ according to Talos Group in a statement. โ€œAs such, tricking a user into visiting a malicious web page or sending a specially crafted email attachment can be enough to trigger this vulnerability.โ€

The vulnerability, which was discovered by Aleksandar Nikolic of Talos, is one of several patched by Adobe in February. In its Adobe security advisory it lists 41 vulnerabilities in Acrobat and Reader, including 17 critical ones that โ€œcould potentially allow an attacker to take control of the affected system.โ€

0.216 Low

EPSS

Percentile

96.0%

Related for THREATPOST:64E079F2EC1F4D520FBA77F2A6B58318