Adobe Acrobat Reader 8.1.2 – 9.0 getIcon() Memory Corruption Exploit <br />Affected Version : Acrobat Reader 8.1.2 - 9.0 <br />Vendor Patch :http://www.adobe. ... b09-04.html <br />Tested On : XP SP2 / SP3 <br /><br />from ZDI : http://www.zerodayinitia ... isories/ZDI-09-014/ <br /><br />This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations <br />of Adobe Acrobat and Adobe Reader. User interaction is required in that a user must visit a <br />malicious web site or open a malicious file.The specific flaw exists when processing malicious <br />java script contained in a PDF document. When supplying a specially crafted argument to the getIcon() <br />method of a Collab object, proper bounds checking is not performed resulting in a stack overflow. <br />If successfully exploited full control of the affected machine running under the credentials of the <br />currently logged in user can be achieved. <br /><br />This vulnerability was discovered by: <br /><br />Tenable Network Security (here is a man named Nicolas Pouvesle and we know == > he have lots of exploitation method ;) ) <br /><br />Exploit By : www.Abysssec.com <br /><br />note : this exploit is just for purpose so shellcode will execute calc if you want other shellcode change shellcode . <br /><br />Exploit Link :http://abysssec.com/Adobe.Collab.getIcon().pdf <br />Mirror Link :http://milw0rm.com/sploi ... getIcon.pdf<br /><br /><blockquote class="blockquote">From: http://www.ipsix.cn/read.php?tid=1707&page=1&toread=1 Powered by PHPWind.com</blockquote>