[Infowarrior] - Critical vulnerability in Adobe Reader

Richard Forno rforno at infowarrior.org
Thu Nov 6 00:48:09 UTC 2008


Critical vulnerability in Adobe Reader
Posted on 04 November 2008.

http://www.net-security.org/secworld.php?id=6715

Core Security Technologies issued an advisory disclosing a  
vulnerability that could affect millions of individuals and businesses  
using Adobe’s Reader PDF file viewing software. Engineers from  
CoreLabs determined that Adobe Reader could be exploited to gain  
access to vulnerable systems via the use of a specially crafted PDF  
file with malicious JavaScript content. Upon making the discovery,  
CoreLabs immediately alerted Adobe to the vulnerability and the two  
companies have since coordinated efforts to ensure that a patch could  
be created and made available to protect users of the program.

Successful exploitation of the vulnerability requires that users open  
a maliciously crafted PDF file thereby allowing attackers to gain  
access to vulnerable systems and assume the privileges of a user  
running Acrobat Reader. Adobe Reader version 9, which was released in  
June 2008, is not vulnerable to the reported problem.

Adobe has issued a security update that addresses the vulnerable  
version 8.1.2 of Reader. Alternatively, users of affected versions of  
the program can also work around the problem and reduce their exposure  
by disabling JavaScript functionality in the software’s Edit| 
Preferences menu.

Vulnerability details

While investigating the feasibility of exploiting a vulnerability  
previously disclosed in Foxit Reader (CVE-2008-1104), a CoreLabs  
researcher found that Adobe Reader was affected by the same bug.

After an initial examination of the involved implementation bug, it  
was believed that although the problem was present, it was apparently  
not exploitable in Adobe Reader due to the use of two structured  
exception handlers in the program. The primary difference between the  
Adobe and Foxit applications is the manner in which they perform  
security checks, and at first glance, it seemed as if the bug was not  
exploitable in Reader, since there was no way to control the program’s  
first exception handler.

However, upon further examination of the code, CoreLabs found that  
another overflow occurs before the call to the involved code is made  
in relation to the previously known vulnerability. This new problem  
was identified in the way vulnerable versions of Adobe Reader  
implement the JavaScript util.printf() function. The function first  
converts the argument it receives to a String, using only the first 16  
digits of the argument and padding the rest with a fixed value of  
“0” (0x30). By passing an overly long and properly formatted command  
to the function, it is possible to overwrite the program’s memory and  
control its execution flow.

A specifically crafted PDF file that embeds JavaScript code to  
manipulate the program’s memory allocation pattern and trigger the  
vulnerability can allow an attack to execute arbitrary code with the  
privileges of a user running the Adobe Reader application.

The vulnerability was discovered by Damián Frizza, a CoreLabs  
researcher and software engineer with the CORE IMPACT Exploit Writers  
Team. The previously disclosed vulnerability (CVE-2008-1104) mentioned  
in this report was discovered in Foxit Reader by Dyon Balding from  
Secunia Research and disclosed on May 20th, 2008. 


More information about the Infowarrior mailing list