Flaw Found in Adobe Acrobat

Discussion in 'News and Article Comments' started by syngod, Jul 6, 2005.

  1. syngod

    syngod Moderator

    Likes Received:
    15
    Trophy Points:
    18
    Adobe has warned of a serious flaw affecting one of the most widely distributed client applications, Acrobat Reader. The flaw leaves users open to attack via maliciously crafted PDF files, which can be spread via e-mail attachments web page links, and can be used to take control of a system.

    "Remote exploitation of a buffer overflow in Adobe Acrobat Reader for Unix could allow an attacker to execute arbitrary code," says security firm IDefense, which discovered the flaw, in an advisory.

    A number of bugs in Acrobat Reader have emerged in recent weeks, but none were particularly serious. The last serious flaw to affect Acrobat Reader was in December 2004, when Acrobat Reader 5.x and 6.x were hit by several vulnerabilities allowing remote attackers to execute malicious code.

    Affected Versions

    The flaw affects Acrobat Reader 5.x for Unix and Linux, which has a large installed base despite the availability of newer versions. PDF is widely used as a platform-independent file format, and unlike Microsoft Office document formats, has full support on Unix and Linux.

    The bug is in the function UnixAppOpenFilePerform(), which is called by Acrobat Reader while opening certain documents, IDefense says. User-supplied data is copied into a fixed-sized stack buffer, which leads to a stack-based buffer overflow and the execution of arbitrary code, IDefense says. A remote attacker can easily choose data to exploit the hole without needing to know stack addresses, says the firm.

    The bug is made somewhat less dangerous by the fact that two error messages appear before the exploit takes effect, but closing the message windows doesn't stop the attack from taking place, IDefense says.

    IDefense and Adobe recommended caution when opening attachments or following links, and says users should upgrade to an unaffected version, such as Acrobat Reader 7.0.

    Source: PC World
     
  2. Anti-Trend

    Anti-Trend Nonconformist Geek

    Likes Received:
    118
    Trophy Points:
    63
    Ick, that's a nasty exploit. My company's been on Acrobat Reader 7 since around January of this year though, since it's worlds better than 5 in every way. To those that don't know, Adobe never released Reader 6 for Unix/Linux, and 5 was atrocious. 7 is a vast improvement.
     
  3. Nic

    Nic Sleepy Head

    Likes Received:
    17
    Trophy Points:
    38
    Wow,, thats not good, not good at all
     
  4. Addis

    Addis The King

    Likes Received:
    91
    Trophy Points:
    48
    Would an NX CPU prevent the buffer overflow?
     
  5. Anti-Trend

    Anti-Trend Nonconformist Geek

    Likes Received:
    118
    Trophy Points:
    63
    SEL or an NX bit would probably prevent a buffer overflow of this nature, probably. As I pointed out though, Acrobat Reader 5 was terrible, so anyone still using that nasty thing should upgrade to 7 anyway (which is not vulnerable to that exploit).
     

Share This Page