首页    新闻    下载    文档    论坛     最新漏洞    黑客教程    数据库    搜索    小榕软件实验室怀旧版    星际争霸WEB版    最新IP准确查询   
名称: 密码:      忘记密码  马上注册
0day :: oday

Adobe Acrobat Reader 8.1.2 ? 9.0 getIcon() Memory Corruption Exploit


(略)
Affected Version : Acrobat Reader 8.1.2 - 9.0
Vendor Patch : http://www.adobe.com/support/security/bulletins/apsb09-04.html
Tested On : XP SP2 / SP3

from ZDI : http://www.zerodayinitiative.com/advisories/ZDI-09-014/

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations
of Adobe Acrobat and Adobe Reader. User interaction is required in that a user must visit a
malicious web site or open a malicious file.The specific flaw exists when processing malicious
JavaScript contained in a PDF document. When supplying a specially crafted argument to the getIcon()
method of a Collab object, proper bounds checking is not performed resulting in a stack overflow.
If successfully exploited full control of the affected machine running under the credentials of the
currently logged in user can be achieved.

This vulnerability was discovered by:

Tenable Network Security (there is a man named Nicolas Pouvesle and we know == > he has lots of exploitation method ; ))

Exploit By : www.Abysssec.com

note : this exploit is just for educational purpose so shellcode will execute calc if you want other shellcode change shellcode .

Exploit Link : http://abysssec.com/Adobe.Collab.getIcon().pdf
Mirror Link : http://milw0rm.com/sploits/2009-Adobe.Collab.getIcon.pdf

[2009-05-04]
<< Unsniff Network Analyzer 1.0 (usnf) Local Heap Overflow PoC Linux Kernel 2.6 UDEV < 141 Local Privilege Escalation Exploit >>
API:
gipsky.com & 安信网络

系统导航

 

Copyright © 2001-2010 安信网络. All Rights Reserved
京ICP备05056747号