Adobe Acrobat Mailto PDF File Command Execution Vulnerability
BID:25748
Info
Adobe Acrobat Mailto PDF File Command Execution Vulnerability
| Bugtraq ID: | 25748 |
| Class: | Input Validation Error |
| CVE: |
CVE-2007-5020 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 20 2007 12:00AM |
| Updated: | Nov 03 2007 12:46AM |
| Credit: | pdp (architect) <[email protected]> discovered this issue. |
| Vulnerable: |
Adobe Reader 7.0.9 Adobe Reader 7.0.8 Adobe Reader 7.0.8 Adobe Reader 7.0.7 Adobe Reader 7.0.6 Adobe Reader 7.0.5 Adobe Reader 7.0.4 Adobe Reader 7.0.3 Adobe Reader 7.0.2 Adobe Reader 7.0.1 Adobe Reader 7.0 Adobe Reader 6.0.4 Adobe Reader 6.0.3 Adobe Reader 6.0.2 Adobe Reader 6.0.1 Adobe Reader 6.0 Adobe Reader 5.1 Adobe Reader 5.0.10 Adobe Reader 5.0.5 Adobe Reader 5.0 Adobe Reader 4.0.5 A Adobe Reader 4.0 5c Adobe Reader 4.0 5 Adobe Reader 4.0 Adobe Reader 3.0 Adobe Reader 8.1 Adobe Reader 8.0 Adobe Acrobat Standard 7.0.8 Adobe Acrobat Standard 7.0.7 Adobe Acrobat Standard 7.0.6 Adobe Acrobat Standard 7.0.5 Adobe Acrobat Standard 7.0.4 Adobe Acrobat Standard 7.0.3 Adobe Acrobat Standard 7.0.2 Adobe Acrobat Standard 7.0.1 Adobe Acrobat Standard 7.0 Adobe Acrobat Standard 8.1 Adobe Acrobat Standard 8.0 Adobe Acrobat Reader (UNIX) 7.0.1 Adobe Acrobat Reader (UNIX) 7.0 Adobe Acrobat Reader (UNIX) 5.0.11 Adobe Acrobat Reader (UNIX) 5.0.10 Adobe Acrobat Reader (UNIX) 5.0.9 Adobe Acrobat Reader (UNIX) 5.0.8 Adobe Acrobat Reader (UNIX) 5.0 7 Adobe Acrobat Reader (UNIX) 5.0 6 Adobe Acrobat Reader (UNIX) 5.0 5 Adobe Acrobat Reader (UNIX) 5.0 Adobe Acrobat Reader (UNIX) 4.0 5 Adobe Acrobat Professional 7.0.8 Adobe Acrobat Professional 7.0.7 Adobe Acrobat Professional 7.0.6 Adobe Acrobat Professional 7.0.5 Adobe Acrobat Professional 7.0.4 Adobe Acrobat Professional 7.0.3 Adobe Acrobat Professional 7.0.2 Adobe Acrobat Professional 7.0.1 Adobe Acrobat Professional 7.0 Adobe Acrobat Professional 8.1 Adobe Acrobat Professional 8.0 Adobe Acrobat 3D 0 Adobe Acrobat 7.0.3 Adobe Acrobat 7.0.2 Adobe Acrobat 7.0.1 Adobe Acrobat 7.0 Adobe Acrobat 6.0.5 Adobe Acrobat 6.0.4 Adobe Acrobat 6.0.3 Adobe Acrobat 6.0.2 Adobe Acrobat 6.0.1 Adobe Acrobat 6.0 Adobe Acrobat 5.0.10 Adobe Acrobat 5.0.5 Adobe Acrobat 5.0 Adobe Acrobat 4.0.5 A Adobe Acrobat 4.0 5c Adobe Acrobat 4.0 5 Adobe Acrobat 4.0 Adobe Acrobat 3.1 Adobe Acrobat 3.0 |
| Not Vulnerable: |
Adobe Reader 8.1.1 Adobe Acrobat Professional 8.1.1 |
Discussion
Adobe Acrobat Mailto PDF File Command Execution Vulnerability
Adobe Acrobat is prone to a command-execution vulnerability when handling malicious PDF files.
Remote attackers can exploit this issue to compromise affected computers..
The vendor reports that this issue can be exploited only through Internet Explorer 7 installed on Microsoft Windows XP.
This issue is related to the one described in BID 25945 (Microsoft Windows URI Handler Command Execution Vulnerability).
NOTE: The issue is being exploited in the wild by Trojan.Pdief.A.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-102310-3513-99
Adobe Acrobat is prone to a command-execution vulnerability when handling malicious PDF files.
Remote attackers can exploit this issue to compromise affected computers..
The vendor reports that this issue can be exploited only through Internet Explorer 7 installed on Microsoft Windows XP.
This issue is related to the one described in BID 25945 (Microsoft Windows URI Handler Command Execution Vulnerability).
NOTE: The issue is being exploited in the wild by Trojan.Pdief.A.
http://www.symantec.com/business/security_response/writeup.jsp?docid=2007-102310-3513-99
Exploit / POC
Adobe Acrobat Mailto PDF File Command Execution Vulnerability
Symantec has reported that this issue is being exploited in the wild by Trojan.Pidief.A.
UPDATE: Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
Symantec has reported that this issue is being exploited in the wild by Trojan.Pidief.A.
UPDATE: Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
Solution / Fix
Adobe Acrobat Mailto PDF File Command Execution Vulnerability
Solution:
An advisory along with fixes are available; please see the references for information on obtaining and applying fixes.
Solution:
An advisory along with fixes are available; please see the references for information on obtaining and applying fixes.
References
Adobe Acrobat Mailto PDF File Command Execution Vulnerability
References:
References:
- Adobe Reader Download Page (Adobe)
- Adobe Updates for Microsoft Windows URI Vulnerability (TA07-297B) (US-CERT)
- When PDF's Attack... Again! (Hon Lau)
- APSB07-18: Update available for vulnerability in versions 8.1 and earlier of Ado (Adobe)
- Microsoft Security Advisory (943521) URL Handling Vulnerability in Windows XP an (Microsoft)
- Workaround available for vulnerability in versions 8.1 and earlier of Adobe Read (Adobe)