Adobe.Acrobat.AcroPDF.Memory.Corruption
Description
This indicates a possible attempt to exploit a memory-corruption vulnerability in Adobe Acrobat Reader.
The vulnerability exists in the "LoadFile" method in the AcroPDF ActiveX control. A remote attacker may exploit this by sending an overly long argument string to this method, resulting in a denial-of-service condition or execution of arbitrary code.
Affected Products
Adobe Acrobat Standard 7.0.8
Adobe Acrobat Standard 7.0.7
Adobe Acrobat Standard 7.0.6
Adobe Acrobat Standard 7.0.5
Adobe Acrobat Standard 7.0.4
Adobe Acrobat Standard 7.0.3
Adobe Acrobat Standard 7.0.2
Adobe Acrobat Standard 7.0.1
Adobe Acrobat Standard 7.0
Adobe Acrobat Reader 7.0.8
Adobe Acrobat Reader 7.0.7
Adobe Acrobat Reader 7.0.6
Adobe Acrobat Reader 7.0.5
Adobe Acrobat Reader 7.0.4
Adobe Acrobat Reader 7.0.3
Adobe Acrobat Reader 7.0.2
Adobe Acrobat Reader 7.0.1
Adobe Acrobat Reader 7.0
Adobe Acrobat Professional 7.0.8
Adobe Acrobat Professional 7.0.7
Adobe Acrobat Professional 7.0.6
Adobe Acrobat Professional 7.0.5
Adobe Acrobat Professional 7.0.4
Adobe Acrobat Professional 7.0.3
Adobe Acrobat Professional 7.0.2
Adobe Acrobat Professional 7.0.1
Adobe Acrobat Professional 7.0
Impact
System compromise: execution of arbitrary code in the context of affected application.
Recommended Actions
Apply the fix released by the vendor, as written in the following advisory:
http://www.adobe.com/support/security/bulletins/apsb06-20.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |