Adobe Acrobat Reader Plugin Cross Site Scripting and Command Execution Vulnerabilities
which could be exploited by attackers to execute arbitrary scripting code, cause a denial of service, or potentially take complete control of an affected system.

The first issue is due to input validation errors in the browser plugin when handling arguments passed to certain parameters (e.g. "FDF", "XML", or "XFDF"), which could be exploited by malicious people to conduct cross site scripting, request redirection, and HTTP response splitting attacks in the security context of a Web site hosting a PDF file by tricking a user into visiting a specially crafted URL.

The second vulnerability is due to a double free error in the web plugin when handling malformed parameters (e.g. "FDF") passed to a PDF document, which could be exploited by attackers to crash a vulnerable browser or execute arbitrary commands by convincing a user to follow a specially crafted URL using Firefox.

The third issue is due to an error in the web plugin when handling an overly long sequence of hash characters appended to a PDF URL loaded via Internet Explorer, which could be exploited by attackers to exhaust all available memory resources, creating a denial of service condition.

Affected Products

Adobe Acrobat Reader version 7.0.8 and prior

Solution

Upgrade to Adobe Reader version 8.0.0 :
http://www.adobe.com/products/acrobat/readstep2.html
더보기

댓글,