关联漏洞
标题:
Adobe Acrobat和Reader 缓冲区错误漏洞
(CVE-2018-12798)
描述:Adobe Acrobat和Reader都是美国奥多比(Adobe)公司的产品。前者是一套PDF文件编辑和转换工具,后者是一套PDF文档阅读软件。 Adobe Acrobat和Reader中存在堆溢出漏洞。攻击者可利用该漏洞在当前用户的上下文中执行任意代码。基于Windows和macOS平台的以下产品和版本受到影响:Adobe Acrobat DC(Continuous)2018.011.20040及之前版本,Acrobat 2017(Classic 2017)2017.011.30080及之前版本,Ac
介绍
# Adobe Acrobat Reader Heap Overflow Remote Code Execution Vulnerability
# Vulnerability
Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability
# Vulnerability Description
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the processing of unicode strings. When parsing, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
# CVE ID
CVE-2018-12798
# Vendor
www.adobe.com
# Product
* Acrobat DC 2018.011.20040 and prior
* Acrobat Reader DC 2018.011.20040 and prior
* Acrobat 2017 2017.011.30080 and prior
* Acrobat Reader 2017 2017.011.30080 and prior
* Acrobat DC 2015.006.30418 and prior
* Acrobat Reader DC 2015.006.30418 and prior
# Disclosure Timeline
1. 08 January 2018 - Reported to vendor
2. 10 July 2018 - Coordinated public release of advisory
# Credits
Ashfaq Ansari and Sudhakar Verma - Project Srishti
# Vendor Advisory
https://helpx.adobe.com/security/products/acrobat/apsb18-21.html
文件快照
[4.0K] /data/pocs/0680f11be1ddf8eacce287bac83a5ee653a763dd
└── [1.3K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。