search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Adobe Acrobat contains a remotely exploitable buffer overflow

Vulnerability Note VU#896220

Original Release Date: 2005-08-16 | Last Revised: 2005-09-08

Overview

A buffer overflow in Adobe Acrobat/Acrobat Reader may allow a remote attacker to execute arbitrary code or cause a denial-of-service condition

Description

Adobe Acrobat is a suite of applications that allow users to manipulate PDF (Portable Document Format) files. A buffer within a core plug-in for Adobe Acrobat and Acrobat Reader can be overwritten using a specially-crafted PDF document.

For more information refer to Adobe Security Advisory 321644.

Impact

If a remote attacker can persuade a user to access a specially crafted PDF file, that attacker may be able to execute arbitrary code or crash the Adobe Acrobat/Acrobat Reader process.

Solution

Upgrade to unaffected version
Upgrade to unaffected versions of Adobe Acrobat and Acrobat Reader. For a list of unaffected versions please see Adobe Security Advisory 321644.

Do not accept PDF files from untrusted sources

Exploitation occurs by accessing a specially crafted PDF file. By only accessing PDF files from trusted or known sources, the chances of exploitation are reduced.

Vendor Information

896220
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Adobe Systems.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2005-2470
Severity Metric: 12.91
Date Public: 2005-08-16
Date First Published: 2005-08-16
Date Last Updated: 2005-09-08 20:26 UTC
Document Revision: 38

Sponsored by CISA.