CVE-2012-2027 : Détail

CVE-2012-2027

56.49%V3
Network
2012-05-08
23h00 +00:00
2014-06-19
17h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Use-after-free vulnerability in Adobe Photoshop CS5 12.x before 12.0.5 and CS5.1 12.1.x before 12.1.1 allows remote attackers to execute arbitrary code via a crafted TIFF (aka .TIF) file.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 18633

Date de publication : 2012-03-19 23h00 +00:00
Auteur : Francis Provencher
EDB Vérifié : Yes

##################################################################################### Application: Adobe Photoshop 12.1 Tiff Parsing Use-After-Free Platforms: Windows {PRL}: 2012-07 Author: Francis Provencher (Protek Research Lab's) Website: http://www.protekresearchlab.com/ Twitter: @ProtekResearch ##################################################################################### 1) Introduction 2) Report Timeline 3) Technical details 4) POC ##################################################################################### =============== 1) Introduction =============== Adobe Photoshop is a graphics editing program developed and published by Adobe Systems Incorporated. Adobe's 2003 "Creative Suite" rebranding led to Adobe Photoshop 8's renaming to Adobe Photoshop CS. Thus, Adobe Photoshop CS5 is the 12th major release of Adobe Photoshop. The CS rebranding also resulted in Adobe offering numerous software packages containing multiple Adobe programs for a reduced price. Adobe Photoshop is released in two editions: Adobe Photoshop, and Adobe Photoshop Extended, with the Extended having extra 3D image creation, motion graphics editing, and advanced image analysis features.[6] Adobe Photoshop Extended is included in all of Adobe's Creative Suite offerings except Design Standard, which includes the Adobe Photoshop edition. Alongside Photoshop and Photoshop Extended, Adobe also publishes Photoshop Elements and Photoshop Lightroom, collectively called "The Adobe Photoshop Family". In 2008, Adobe released Adobe Photoshop Express, a free web-based image editing tool to edit photos directly on blogs and social networking sites; in 2011 a version was released for the Android operating system and the iOS operating system.[7][8] Adobe only supports Windows and Macintosh versions of Photoshop, but using Wine, Photoshop CS5 can run well on Linux (http://en.wikipedia.org/wiki/Adobe_Photoshop) ##################################################################################### ============================ 2) Report Timeline ============================ 2011-09-20 Vulnerability reported to Adobe 2012-03-20 Publication of this advisory (180 days after reporting to the vendor) ##################################################################################### ============================ 3) Technical details ============================ The vulnerability is caused due to an error when processing Tiff file format image, which can be exploited to cause a use-after-free by e.g. tricking a user into opening a specially crafted file. ##################################################################################### =========== 4) POC =========== http://www.protekresearchlab.com/exploits/PRL-2012-07.tif https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19338.tif

Products Mentioned

Configuraton 0

Adobe>>Photoshop >> Version *

Adobe>>Photoshop >> Version 2.5

Adobe>>Photoshop >> Version 3.0

Adobe>>Photoshop >> Version 4.0

Adobe>>Photoshop >> Version 5.0

Adobe>>Photoshop >> Version 6.0

Adobe>>Photoshop >> Version 6.0

Adobe>>Photoshop >> Version 6.0.1

Adobe>>Photoshop >> Version 7.0

Adobe>>Photoshop >> Version 7.0.1

Adobe>>Photoshop >> Version 8.0

Adobe>>Photoshop >> Version 9.0

Adobe>>Photoshop >> Version 9.0.1

Adobe>>Photoshop >> Version 9.0.2

Adobe>>Photoshop >> Version 10.0

Adobe>>Photoshop >> Version 10.0.1

Adobe>>Photoshop >> Version 11.0

Adobe>>Photoshop >> Version 11.0

Adobe>>Photoshop >> Version 11.0.1

Adobe>>Photoshop >> Version 11.0.2

Adobe>>Photoshop >> Version 11.0.4

Adobe>>Photoshop >> Version 12.0.0

Adobe>>Photoshop >> Version 12.0.1

Adobe>>Photoshop >> Version 12.0.2

Adobe>>Photoshop >> Version 12.0.3

Adobe>>Photoshop >> Version 12.0.4

Adobe>>Photoshop_cs4 >> Version 11.0

Adobe>>Photoshop_cs5.5 >> Version To (including) 12.0

    Références

    http://www.securityfocus.com/bid/52634
    Tags : vdb-entry, x_refsource_BID