HTTP: Adobe Reader U3D CLODMeshDeclaration Shading Count Buffer Overflow
This signature detects attempts to exploit a known buffer overflow vulnerability in Adobe Acrobat Reader. It is due to an integer overflow when processing the "Shading Count" field in the CLOD Mesh Declaration block. This can be exploited by remote attackers to execute arbitrary code on the system by enticing a user to open a maliciously crafted PDF document. In a successful attack, the injected code runs within the security context of the currently logged in user. In an unsuccessful attack, the affected application can terminate abnormally leading to a denial-of-service condition.
Extended Description
Adobe Acrobat and Reader are prone to a heap-based buffer-overflow vulnerability because they fail to properly validate user-supplied input. Attackers can exploit this issue to execute arbitrary code in the context of the user running the application. Failed exploit attempts will result in a denial of service. The following products are affected: Adobe Reader 9.3.1 and prior for Windows, Macintosh, and UNIX Adobe Acrobat 9.3.1 and prior for Windows and Macintosh Adobe Reader 8.2.1 and prior for Windows and Macintosh Acrobat 8.2.1 and prior for Windows and Macintosh Note: This vulnerability was previously documented in BID 39329 (Adobe Acrobat and Reader April 2010 Multiple Remote Vulnerabilities) but has been given its own record to better document the issue.
Affected Products
Red_hat enterprise_linux_as_extras
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Adobe
Gentoo
9.3