HTTP: OpenAction JavaScript in Adobe PDF

This signature detects a OpenAction JavaScript parameter in PDF files sent via HTTP. The OpenAction parameter defines what action should occur when the document is opened. By specifying that a JavaScript program be run, an attacker could write malicious JavaScript that would execute when a user tried to read the PDF file. Some known cases resulted in remote arbitrary code execution.

Extended Description

Adobe Reader is prone to a remote code-execution vulnerability. An attacker can exploit this issue to execute arbitrary code with the privileges of the user running the application or crash the application, denying service to legitimate users. Reader 8.1.4 and 9.1 for Linux are vulnerable; other versions or platforms may also be affected. UPDATE (April 28, 2009): The vendor is investigating this issue. We will update this BID as more information emerges. UPDATE (May 1, 2009): The vendor indicates that fixes will be available by May 12, 2009. Please see the referenced advisory for more information. UPDATE (May 18, 2009): The vendor indicates that fixes for Adobe Reader 7 for Apple Mac OS X will be available by the end of June, 2009. Please see the updated advisory for more information.

Affected Products

Nortel_networks self-service_speech_server,Red_hat enterprise_linux_as_extras

References

BugTraq: 34736

Short Name
HTTP:STC:ADOBE:PDF-OPENACTION
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Adobe JavaScript OpenAction PDF bid:34736 in
Release Date
04/30/2009
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Adobe

Gentoo

Sun

Avaya

Nortel_networks

Suse

Found a potential security threat?