Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Adobe Acrobat/Reader Vendors:   Adobe Systems Incorporated
Adobe Acrobat Reader Can Be Crashed By PDF Files With Certain Values
SecurityTracker Alert ID:  1009734
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 12 2004
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): 4.0, 5.0
Description:   A denial of service vulnerability was reported in the Adobe Acrobat Reader. A remote user can create a PDF file that, when viewed by the target user, will cause the target user's reader to crash.

Arman Nayyeri reported that a remote user can edit a PDF file with a hex editor to change a certain value to a large number. Then, when the PDF file is loaded by a target user, the specially crafted PDF file will reportedly cause the reader to attempt to repair the file and consume an excessive amount of memory. The reader will freeze in most cases, the report said.

A demonstration exploit is provided:

"/UseOutlines ?>> ?endobj?[big number]"

Some demonstration exploit URLs are also provided:

The vendor has reportedly been notified.

Impact:   A remote user can create a PDF file that, when loaded by the target user, will cause excessive memory to be consumed on the target user's system and may cause the target user's reader to freeze.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.

 Source Message Contents

Subject:  Adobe Acrobat Reader PDF file DoS vulnerability

Adobe Acrobat Reader PDF file DoS vulnerability
Title:     Adobe Acrobat Reader PDF file DoS vulnerability
HappyName: Too hunger for memory?
Date:      Sunday, April 11, 2004
Software:  Adobe Acrobat Reader v4.0-v5.0
Vendor:    Adobe Corporation
Patch:     Vendor notified, Look at "Vendor Status" section
Author:    Arman Nayyeri, arman-n[at],
Severity:  Low

I found this vulnerability by hex editing a pdf file and changing a value
to a large number. after executing the pdf file, the adobe acrobat reader
displays a messagebox saying that the file is damaged and being repaired.
But it takes too long to pdf to be repaired and it will allocate a large
amount of memory to itself, so it will cause a DoS in memory.
In most cases windows will freez, because there is no memory for loading
any program, a messageboxes telling virtual memory too low will be displayed.
I don't have any info about the value in the pdf, what it will do, or anything
else! this code in pdf will cause dos in acrobat reader: 
"/UseOutlines ?>> ?endobj?[big number]"
in the exploit I use : "/UseOutlines ?>> ?endobj?9999999".
As the pdf files can be automatically loaded by web pages this vulnerability
becomes more dangerous.

I provide a page that loads pdf file by embed tag, it will cause the memory
to fills up.

This DoS will cause serious system instability, please save your work before
loading this page, you may need to restart your computer!

Here is the page that loads pdf:

Download pdf: (BIG ONE) (SMALL ONE)

please, take a look at my website too!

Exploit Tested On
Adobe Acrobat Reader 4.0
Adobe Acrobat Reader 5.0

Vendor Status
Adobe notified about 3 month ago.
they request a sample and the description, I send it.
but I don't recieve any response.

Special Thanks
Special thanks to god.

Do I discover more vulnerabilities?

Arman Nayyeri is not responsible for the misuse of the information 
provided in this advisory. The opinions expressed are my own and not of 
any company. In no event shall the author be liable for any damages 
whatsoever arising out of or in connection with the use or spread of this 
advisory. Any use of the information is at the user's own risk.

and sorry for my bad english,
Arman Nayyeri


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, LLC