Adobe Photoshop 'U3D.B8I' Library Remote Buffer Overflow Vulnerability
BID:53464
Info
Adobe Photoshop 'U3D.B8I' Library Remote Buffer Overflow Vulnerability
| Bugtraq ID: | 53464 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2012-2052 |
| Remote: | Yes |
| Local: | No |
| Published: | May 11 2012 12:00AM |
| Updated: | Jun 05 2012 04:10PM |
| Credit: | rgod |
| Vulnerable: |
Adobe Photoshop CS5.1 Adobe Photoshop CS5 |
| Not Vulnerable: |
Adobe Photoshop CS6 0 |
Discussion
Adobe Photoshop 'U3D.B8I' Library Remote Buffer Overflow Vulnerability
Adobe Photoshop is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data.
Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Successful exploits will compromise the affected application and possibly the underlying computer. Failed exploit attempts may cause a denial-of-service condition.
Adobe Photoshop CS5 and CS5.1 are vulnerable; other versions may also be affected.
Adobe Photoshop is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data.
Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Successful exploits will compromise the affected application and possibly the underlying computer. Failed exploit attempts may cause a denial-of-service condition.
Adobe Photoshop CS5 and CS5.1 are vulnerable; other versions may also be affected.
Exploit / POC
Adobe Photoshop 'U3D.B8I' Library Remote Buffer Overflow Vulnerability
The following exploit is available:
The following exploit is available:
Solution / Fix
Adobe Photoshop 'U3D.B8I' Library Remote Buffer Overflow Vulnerability
Solution:
Updates are available. Please see the references for more information.
Solution:
Updates are available. Please see the references for more information.
References
Adobe Photoshop 'U3D.B8I' Library Remote Buffer Overflow Vulnerability
References:
References: