
17 new exploits Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (2) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (3) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (4) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (5) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (6) Adobe Acrobat Reader DC 15.016.20045 - Invalid Font (.ttf ) Memory Corruption (7) Adobe Flash Player 22.0.0.192 - DefineBitsJPEG2 Memory Corruption Adobe Flash Player 22.0.0.192 - DefineSprite Memory Corruption Adobe Flash Player 22.0.0.192 - TAG Memory Corruption Adobe Flash Player 22.0.0.192 - SceneAndFrameData Memory Corruption Windows x86 URLDownloadToFileA()+SetFileAttributesA()+WinExec()+ExitProcess() Shellcode GSX Analyzer 10.12 and 11 - Main.swf Hardcoded Superadmin Credentials MS16-032 Secondary Logon Handle Privilege Escalation Riverbed SteelCentral NetProfiler/NetExpress Remote Code Execution Apache Archiva 1.3.9 - Multiple CSRF Vulnerabilities Linux x86 Reverse Shell using Xterm ///usr/bin/xterm -display 127.1.1.1:10
56 lines
No EOL
2 KiB
Text
Executable file
56 lines
No EOL
2 KiB
Text
Executable file
#####################################################################################
|
|
|
|
# Application: Adobe Acrobat Reader DC
|
|
# Platforms: Windows,OSX
|
|
# Versions: 15.016.20045 and earlier
|
|
# Author: Sébastien Morin of COSIG
|
|
# Website: https://cosig.gouv.qc.ca/en/advisory/
|
|
# Twitter: @COSIG_
|
|
# Date: July 12, 2016
|
|
# CVE: CVE-2016-4203
|
|
# COSIG-2016-28
|
|
|
|
#####################################################################################
|
|
|
|
1) Introduction
|
|
2) Report Timeline
|
|
3) Technical details
|
|
4) POC
|
|
|
|
#####################################################################################
|
|
|
|
================
|
|
1) Introduction
|
|
================
|
|
Adobe Acrobat is a family of application software and Web services developed by Adobe Systems to view, create, manipulate, print and manage files in Portable Document Format (PDF).
|
|
|
|
(https://en.wikipedia.org/wiki/Adobe_Acrobat)
|
|
|
|
#####################################################################################
|
|
|
|
====================
|
|
2) Report Timeline
|
|
====================
|
|
2016-05-18: Sébastien Morin of COSIG report this vulnerability to Adobe PSIRT;
|
|
2016-06-08: Adobe PSIRT confirm this vulnerability;
|
|
2016-07-12: Adobe fixed the issue (APSB16-26);
|
|
2016-07-12: Advisory released by COSIG;
|
|
|
|
#####################################################################################
|
|
|
|
=====================
|
|
3) Technical details
|
|
=====================
|
|
The vulnerability allows a remote attacker to execute malicious code or access to part of dynamically allocated memory using a user interaction
|
|
that opens a specially crafted PDF file containing an invalid font (.ttf ) including invalid data.
|
|
|
|
#####################################################################################
|
|
|
|
===========
|
|
4) POC
|
|
===========
|
|
|
|
https://cosig.gouv.qc.ca/wp-content/uploads/2016/07/COSIG-2016-28.pdf
|
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/40097.zip
|
|
|
|
#################################################################################### |