SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Adobe Acrobat/Reader Vendors:   Adobe Systems Incorporated
Adobe Acrobat Reader Can Be Crashed By PDF Files With Certain Values
SecurityTracker Alert ID:  1009734
SecurityTracker URL:  http://securitytracker.com/id/1009734
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 12 2004
Impact:   Denial of service via network
Exploit Included:  Yes  
Version(s): 4.0, 5.0
Description:   A denial of service vulnerability was reported in the Adobe Acrobat Reader. A remote user can create a PDF file that, when viewed by the target user, will cause the target user's reader to crash.

Arman Nayyeri reported that a remote user can edit a PDF file with a hex editor to change a certain value to a large number. Then, when the PDF file is loaded by a target user, the specially crafted PDF file will reportedly cause the reader to attempt to repair the file and consume an excessive amount of memory. The reader will freeze in most cases, the report said.

A demonstration exploit is provided:

"/UseOutlines ?>> ?endobj?[big number]"

Some demonstration exploit URLs are also provided:

http://www.4rman.com/exploits/pdfdos.htm

http://www.4rman.com/exploits/thanks.pdf

http://www.4rman.com/exploits/thanks2.pdf

The vendor has reportedly been notified.

Impact:   A remote user can create a PDF file that, when loaded by the target user, will cause excessive memory to be consumed on the target user's system and may cause the target user's reader to freeze.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.adobe.com/ (Links to External Site)
Cause:   Exception handling error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Adobe Acrobat Reader PDF file DoS vulnerability




Adobe Acrobat Reader PDF file DoS vulnerability
===============================================
Title:     Adobe Acrobat Reader PDF file DoS vulnerability
HappyName: Too hunger for memory?
Date:      Sunday, April 11, 2004
Software:  Adobe Acrobat Reader v4.0-v5.0
Vendor:    Adobe Corporation
Patch:     Vendor notified, Look at "Vendor Status" section
Author:    Arman Nayyeri, arman-n[at]phreaker.net, http://www.4rman.com
Severity:  Low


Description:
============
I found this vulnerability by hex editing a pdf file and changing a value
to a large number. after executing the pdf file, the adobe acrobat reader
displays a messagebox saying that the file is damaged and being repaired.
But it takes too long to pdf to be repaired and it will allocate a large
amount of memory to itself, so it will cause a DoS in memory.
In most cases windows will freez, because there is no memory for loading
any program, a messageboxes telling virtual memory too low will be displayed.
I don't have any info about the value in the pdf, what it will do, or anything
else! this code in pdf will cause dos in acrobat reader: 
"/UseOutlines ?>> ?endobj?[big number]"
in the exploit I use : "/UseOutlines ?>> ?endobj?9999999".
As the pdf files can be automatically loaded by web pages this vulnerability
becomes more dangerous.


Exploit:
========
I provide a page that loads pdf file by embed tag, it will cause the memory
to fills up.

WARNING!!!!!
This DoS will cause serious system instability, please save your work before
loading this page, you may need to restart your computer!

Here is the page that loads pdf:
http://www.4rman.com/exploits/pdfdos.htm

Download pdf:
http://www.4rman.com/exploits/thanks.pdf (BIG ONE)
http://www.4rman.com/exploits/thanks2.pdf (SMALL ONE)

please, take a look at my website too!
http://www.4rman.com


Exploit Tested On
=================
Adobe Acrobat Reader 4.0
Adobe Acrobat Reader 5.0


Vendor Status
=============
Adobe notified about 3 month ago.
they request a sample and the description, I send it.
but I don't recieve any response.

Special Thanks
==============
Special thanks to god.


Do I discover more vulnerabilities?
===================================
Maybe!(heh)


Disclaimer:
===========
Arman Nayyeri is not responsible for the misuse of the information 
provided in this advisory. The opinions expressed are my own and not of 
any company. In no event shall the author be liable for any damages 
whatsoever arising out of or in connection with the use or spread of this 
advisory. Any use of the information is at the user's own risk.

~~~~~~~~~~~~~~
and sorry for my bad english,
Arman Nayyeri
		From
			Iran
http://www.4rman.com

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC