安海论坛,安海,安海招聘,安海人才网,安海房产网,安海新闻,泉州南翼新区,便民车,安海门户社区,安海

 找回密码
 立即注册

微信扫码登录

使用验证码登录

查看: 7044|回复: 0

Adobe Acrobat Reader 8.1.2 – 9.0 getIcon() Memory Corruption Exploit

[复制链接]
发表于 2009-12-19 00:15:30 | 显示全部楼层 |阅读模式
Adobe Acrobat Reader 8&#46;1&#46;2 – 9&#46;0 getIcon() Memory Corruption Exploit <br />Affected Version   : Acrobat Reader 8&#46;1&#46;2 - 9&#46;0 <br />Vendor  Patch      :http://www&#46;adobe&#46 ... b09-04&#46;html <br />Tested   On        : XP SP2 / SP3 <br /><br />from ZDI :  http://www&#46;zerodayinitia ... isories/ZDI-09-014/ <br /><br />This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations <br />of Adobe Acrobat and Adobe Reader&#46; User interaction is required in that a user must visit a <br />malicious web site or open a malicious file&#46;The specific flaw exists when processing malicious <br />java script contained in a PDF document&#46; When supplying a specially crafted argument to the getIcon() <br />method of a Collab object, proper bounds checking is not performed resulting in a stack overflow&#46; <br />If successfully exploited full control of the affected machine running under the credentials of the <br />currently logged in user can be achieved&#46; <br /><br />This vulnerability was discovered by: <br /><br />Tenable Network Security (here is a man named Nicolas Pouvesle and we know == &gt; he have lots of exploitation method ;)  ) <br /><br />Exploit By :  www&#46;Abysssec&#46;com <br /><br />note : this exploit is just for purpose so shellcode will execute calc if you want other shellcode change shellcode &#46; <br /><br />Exploit Link :http://abysssec&#46;com/Adobe&#46;Collab&#46;getIcon()&#46;pdf <br />Mirror  Link :http://milw0rm&#46;com/sploi ... getIcon&#46;pdf<br /><br /><blockquote class="blockquote">From: http://www&#46;ipsix&#46;cn/read&#46;php?tid=1707&page=1&toread=1  Powered by PHPWind&#46;com</blockquote>
默认签名:关注【安海论坛】 ah77177 微信平台
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

关注官方微信扫一扫上一条 /1 下一条

Powered by Discuz! X3.5 Licensed

© 2001-2025 Discuz! Team.

快速回复 返回顶部 返回列表