Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Extremely critical

Adobe Reader/Acrobat Multiple Vulnerabilities

-

Release Date:  2010-06-05    Last Update:  2010-07-01    Views:  40,246

Secunia Advisory SA40034

Where:

From remote

Impact:

System access

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Multiple vulnerabilities have been reported in Adobe Reader/Acrobat, which can be exploited by malicious people to compromise a user's system.

1) The application bundles a vulnerable version of Flash Player (authplay.dll).

For more information:
SA40026

NOTE: One of the vulnerabilities is currently being actively exploited.

2) An uninitialised memory error in AcroForm.api when processing JPEG image data can be exploited to bypass a recent fix and dereference out-of-bounds memory when a specially crafted PDF file is opened.

3) An array-indexing error in AcroForm.api when parsing GIF image data can be exploited to bypass a size check implemented by a recent fix and cause a heap-based buffer overflow when a specially crafted PDF file is opened.

4) An unspecified error can be exploited to corrupt memory.

5) An error when parsing a CLOD Progressive Mesh Continuation Resolution Update can be exploited to corrupt memory.

6) An unspecified error can be exploited to corrupt memory on *NIX systems.

7) An unspecified error can be exploited to corrupt memory.

8) A use-after-free error may result in a deleted heap object being dereferenced.

9) An unspecified error can be exploited to corrupt memory.

10) An unspecified error can be exploited to corrupt memory.

11) An unspecified error can be exploited to corrupt memory.

Successful exploitation of the vulnerabilities may allow execution of arbitrary code.

The vulnerabilities are reported in:
* Adobe Reader 9.3.2 (and earlier versions) for Windows, Macintosh and UNIX
* Adobe Acrobat 9.3.2 (and earlier versions) for Windows and Macintosh
* Adobe Reader 8.2.2 (and earlier versions) for Windows and Macintosh
* Adobe Acrobat 8.2.2 (and earlier versions) for Windows and Macintosh

NOTE: It has also been reported that content in a certain text field in the file launching warning dialog can be manipulated in a manner that may aid in social-engineering attacks. An error in CoolType.dll was also reported, which may cause an out-of-bounds read access violation and crash the application.


Solution:
Update to version 9.3.3 or 8.2.3.

Further details available to Secunia VIM customers

Provided and/or discovered by:
1) Reported as a 0-day.
2) Alin Rad Pop, Secunia Research.
3) Carsten Eiram, Secunia Research.
4) The vendor credits Microsoft Vulnerability Research (MSVR).
5) An anonymous person via ZDI.
6) The vendor credits James Quirk.
7-11) The vendor credits Tavis Ormandy, Google Security Team.

Bug in file launching dialog reported by Didier Stevens and Philippe Lagadec, NATO C3 Agency.
Bug in CoolType.dll library reported by Gjoko Krstic, Zero Science Lab.

Original Advisory:
Adobe:
http://www.adobe.com/support/security/bulletins/apsb10-15.html

Secunia Research:
http://secunia.com/secunia_research/2010-74/
http://secunia.com/secunia_research/2010-88/

Zero Science Lab:
http://www.zeroscience.mk/en/vulnerabilities/ZSL-2010-4943.php

ZDI:
http://www.zerodayinitiative.com/advisories/ZDI-10-116/

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Adobe Reader/Acrobat Multiple Vulnerabilities

User Message
carone1 RE: Adobe Reader/Acrobat authplay.dll AVM2 "newfunction" Handling Vulnerability
Member 22nd Jun, 2010 14:50
Score: 3
Posts: 1
User Since: 22nd Jun 2010
System Score: N/A
Location: ZA
Last edited on 22nd Jun, 2010 14:50
Security Advisory for Flash Player, Adobe Reader and Acrobat

Release date: June 4, 2010

Last updated: June 10, 2010

Vulnerability identifier: APSA10-01

CVE number: CVE-2010-1297

Platform: All
Summary

A critical vulnerability exists in Adobe Flash Player 10.0.45.2 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems, and the authplay.dll component that ships with Adobe Reader and Acrobat 9.x for Windows, Macintosh and UNIX operating systems. This vulnerability (CVE-2010-1297) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild against both Adobe Flash Player, and Adobe Reader and Acrobat.

Adobe has released a product update to Adobe Flash Player to resolve the relevant security issue. For more information, please refer to Security Bulletin APSB10-14.

We expect to provide an update for Adobe Reader and Acrobat 9.3.2 for Windows, Macintosh and UNIX by June 29, 2010. Please note that the Acrobat and Reader update represents an accelerated release of the next quarterly security update originally scheduled for July 13, 2010. With this accelerated scheduled we do not plan to release any new updates for Adobe Reader and Acrobat on July 13, 2010.
Affected software versions

Adobe Flash Player 10.0.45.2, 9.0.262, and earlier 10.0.x and 9.0.x versions for Windows, Macintosh, Linux and Solaris
Adobe Reader and Acrobat 9.3.2 and earlier 9.x versions for Windows, Macintosh and UNIX

Note: Adobe Reader and Acrobat 8.x are confirmed not vulnerable.
Was this reply relevant?
+3
-0
HamitOzen RE: Adobe Reader/Acrobat authplay.dll AVM2 "newfunction" Handling Vulnerability
Member 27th Jun, 2010 02:31
Score: 2
Posts: 4
User Since: 27th Jun 2010
System Score: N/A
Location: TR
Last edited on 27th Jun, 2010 02:31
Step by Step and very detailed analysis of this vulnerability exists here:

https://www.rafzar.com/node/20
Was this reply relevant?
+2
-0

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability