Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Try our Premium Alert Service
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service

Category:   Application (Generic)  >   Adobe Acrobat/Reader Vendors:   Adobe Systems Incorporated
Adobe Reader and Acrobat '/launch' Command Warning Dialog Message Can Be Modified By Remote Users
SecurityTracker Alert ID:  1023828
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 7 2010
Impact:   Modification of user information
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Adobe Reader and Acrobat. A remote user can modify a portion of a file execution warning dialog.

A remote user can create a specially crafted PDF file containing an embedded executable to be automatically executed via the '/launch' command. When the target user loads the PDF file, a dialog box will be displayed to ask the target user to authorize the launching of the executable. The remote user can name the embedded executable so that arbitrary text will be displayed in the 'file name' portion of the dialog box, which may confuse some target users and convince them to authorize the launching of the executable.

Didier Stevens reported this vulnerability.

The original advisory is available at:

[Editor's note: The '/launch' command and the capability to embed executables is part of the PDF specification and is not a vulnerability in the specific Adobe implementation. However, the potentially confusing manner in which the embedded executable warning dialog is displayed is a vulnerability in the Adobe product.]

Impact:   A remote user can modify a portion of a file execution warning dialog.
Solution:   No solution was available at the time of this entry.

The vendor is investigating this issue.

The vendor has described a workaround for Windows-based systems, available at:

Vendor URL: (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (macOS/OS X), UNIX (Solaris - SunOS), Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, LLC