SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Adobe Acrobat/Reader Vendors:   Adobe Systems Incorporated
Adobe Reader and Acrobat '/launch' Command Warning Dialog Message Can Be Modified By Remote Users
SecurityTracker Alert ID:  1023828
SecurityTracker URL:  http://securitytracker.com/id/1023828
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 7 2010
Impact:   Modification of user information
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Adobe Reader and Acrobat. A remote user can modify a portion of a file execution warning dialog.

A remote user can create a specially crafted PDF file containing an embedded executable to be automatically executed via the '/launch' command. When the target user loads the PDF file, a dialog box will be displayed to ask the target user to authorize the launching of the executable. The remote user can name the embedded executable so that arbitrary text will be displayed in the 'file name' portion of the dialog box, which may confuse some target users and convince them to authorize the launching of the executable.

Didier Stevens reported this vulnerability.

The original advisory is available at:

http://blog.didierstevens.com/2010/03/29/escape-from-pdf/

[Editor's note: The '/launch' command and the capability to embed executables is part of the PDF specification and is not a vulnerability in the specific Adobe implementation. However, the potentially confusing manner in which the embedded executable warning dialog is displayed is a vulnerability in the Adobe product.]

Impact:   A remote user can modify a portion of a file execution warning dialog.
Solution:   No solution was available at the time of this entry.

The vendor is investigating this issue.

The vendor has described a workaround for Windows-based systems, available at:

http://blogs.adobe.com/adobereader/2010/04/didier_stevens_launch_function.html

Vendor URL:  blogs.adobe.com/adobereader/2010/04/didier_stevens_launch_function.html (Links to External Site)
Cause:   Input validation error
Underlying OS:   Linux (Any), UNIX (OS X), UNIX (Solaris - SunOS), Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Wed, 07 Apr 2010 16:37:56 +0000
Subject:  Adobe Acrobat / Adobe Reader


http://blogs.adobe.com/adobereader/2010/04/didier_stevens_launch_function.html

http://blog.didierstevens.com/2010/03/29/escape-from-pdf/
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC