Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
[sec-labs] Adobe Acrobat Reader <=5.0.7 Buffer Overflow Vulnerability + PoC code
From: sec-labs team (teamsec-labs.hack.pl)
Date: Tue Jul 01 2003 - 10:08:30 CDT
sec-labs team proudly presents:
Buffer overflow vulnerability in Adobe Acrobat Reader 5.0.7 and earlier
quote from documentation:
'The Acrobat Reader allows anyone to view, navigate, and print documents
in the Adobe Portable Document Format (PDF).'
However there is Acrobat Reader 6.0 for windows nad MacOS, version 5.0.7
is last for unix.
There is buffer overflow vulnerability in WWWLaunchNetscape function. It
copies link address to 256 bytes (in 5.0.5 version) buffer until '\0' is
found. If link is longer than 256 bytes return address is overwritten.
Notice that user have to execute (click on it) our link to exploit this
vulnerability. User also have to have netscape browser in preferences,
but it is default setting.
If somebody click on a link from .pdf file specialy prepared by attacker,
malicious code can be executed with his privileges.
IV. PROOF OF CONCEPT
Proof of concept exploit is attached. It doesn't contain shellcode nor
valid return address. It just shows that return address can be overwriten
with any value. Use gdb to see it, because acroread will not crash.
sec-labs team [http://sec-labs.hack.pl]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.0 (GNU/Linux)
-----END PGP SIGNATURE-----
- application/octet-stream attachment: seclabs-poc-adobe-acrobat-reader-29-06-2003.tar.bz2