SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Nortel Self-Service Vendors:   Nortel
(Nortel Issues Fix for Nortel Self-Service) Adobe Acrobat Multiple Flaws Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1022260
SecurityTracker URL:  http://securitytracker.com/id/1022260
CVE Reference:   CVE-2008-2549, CVE-2008-2992, CVE-2008-4812, CVE-2008-4813, CVE-2008-4814, CVE-2008-4815, CVE-2008-4816, CVE-2008-4817   (Links to External Site)
Date:  May 20 2009
Impact:   Execution of arbitrary code via network, Modification of system information, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in Adobe Acrobat. A remote user can cause arbitrary code to be executed on the target user's system. A local user can obtain elevated privileges. Nortel Self-Service is affected.

A remote user can create a specially crafted file that, when loaded by the target user, will trigger any of several flaws and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Multiple input validation errors allow code execution [CVE-2008-4812, CVE-2008-4813].

Input validation flaws in JavaScript methods allow code execution [CVE-2008-2992, CVE-2008-4814].

An input validation flaw in the Download Manager may allow code execution during the download process [CVE-2008-4817].

A flaw in the Windows-version of the Download Manager may allow the target user's Internet Security options to be modified during the download process [CVE-2008-4816].

A local user may be able to obtain elevated privileges on UNIX-based systems [CVE-2008-4815].

A user can cause denial of service conditions [CVE-2008-2549].

Adobe Reader 9 and Acrobat 9 are not affected by these vulnerabilities.

Greg MacManus of iDefense Labs, Peter Vreugdenhil via TippingPoint's Zero Day Initiative and via iDefense, Dyon Balding of Secunia Research, Will Dormann of CERT/CC, Damian Frizza of Core Security Technologies, Greg MacManus of iSIGHT Partners Labs, Javier Vicente Vallejo via TippingPoint's Zero Day Initiative, Thomas Garnier of SkyRecon Systems, and Josh Bressers of Red Hat reported these vulnerabilities.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

A local user can obtain elevated privileges.

Solution:   Nortel has issued a fix (Adobe update 8.1.4, bundled into the Solaris patch and available with Nortel PERIdoc patch doc3.0.0.6) for Nortel Self-Service, which is affected by these vulnerabilities [all except CVE-2008-4816].

Nortel CCSS7, Periphonics Application, and Periphonics Workstation are affected.

The Nortel advisory is available at:

http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=909609

Cause:   Access control error, Input validation error, Not specified
Underlying OS:  UNIX (Solaris - SunOS)

Message History:   This archive entry is a follow-up to the message listed below.
Nov 4 2008 Adobe Acrobat Multiple Flaws Let Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC