spiderwebwoman …

… step into my parlor

Security Advisory: Acrobat and Adobe Reader plug-in buffer overflow

Filed under: Security — spiderwebwoman at 8:59 pm on Wednesday, August 17, 2005

Security Advisory: Acrobat and Adobe Reader plug-in buffer overflow

 

 

Release Date: August 16th, 2005

 

 

Products: Adobe Reader 5.1, 6.0-6.0.3, 7.0-7.0.2, Adobe Acrobat 5.0-5.0.5, 6.0-6.0.3, 7.0-7.0.2

 

Platform : Windows, Mac OS, Linux, Solaris

 

Vulnerability Identifier: CVE-2005-2470

 

Overview: Adobe has discovered a buffer overflow in Adobe Acrobat and Adobe Reader. This issue has been addressed and a product update is available to proactively mitigate potential malicious activity. Adobe always recommends that users keep their systems up to date, and install the latest update of these applications.

 

Effect: If the vulnerability were successfully exploited, the application could crash with an increased risk of arbitrary code execution.

 

Details: The identified vulnerability is a buffer overflow within a core application plug-in, which is part of Adobe Acrobat and Adobe Reader. If a malicious file were opened it could trigger a buffer overflow as the file is being loaded into Adobe Acrobat and Adobe Reader. A buffer overflow can cause the application to crash and increase the risk of malicious code execution.

 

http://www.adobe.com/support/techdocs/321644.html



No Comments

No comments yet.

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.