Adobe.Acrobat.AcroPDF.Memory.Corruption

description-logoDescription

This indicates a possible attempt to exploit a memory-corruption vulnerability in Adobe Acrobat Reader.
The vulnerability exists in the "LoadFile" method in the AcroPDF ActiveX control. A remote attacker may exploit this by sending an overly long argument string to this method, resulting in a denial-of-service condition or execution of arbitrary code.

affected-products-logoAffected Products

Adobe Acrobat Standard 7.0.8
Adobe Acrobat Standard 7.0.7
Adobe Acrobat Standard 7.0.6
Adobe Acrobat Standard 7.0.5
Adobe Acrobat Standard 7.0.4
Adobe Acrobat Standard 7.0.3
Adobe Acrobat Standard 7.0.2
Adobe Acrobat Standard 7.0.1
Adobe Acrobat Standard 7.0
Adobe Acrobat Reader 7.0.8
Adobe Acrobat Reader 7.0.7
Adobe Acrobat Reader 7.0.6
Adobe Acrobat Reader 7.0.5
Adobe Acrobat Reader 7.0.4
Adobe Acrobat Reader 7.0.3
Adobe Acrobat Reader 7.0.2
Adobe Acrobat Reader 7.0.1
Adobe Acrobat Reader 7.0
Adobe Acrobat Professional 7.0.8
Adobe Acrobat Professional 7.0.7
Adobe Acrobat Professional 7.0.6
Adobe Acrobat Professional 7.0.5
Adobe Acrobat Professional 7.0.4
Adobe Acrobat Professional 7.0.3
Adobe Acrobat Professional 7.0.2
Adobe Acrobat Professional 7.0.1
Adobe Acrobat Professional 7.0

Impact logoImpact

System compromise: execution of arbitrary code in the context of affected application.

recomended-action-logoRecommended Actions

Apply the fix released by the vendor, as written in the following advisory:
http://www.adobe.com/support/security/bulletins/apsb06-20.html

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

References

21155-acropdf_dos