Stack-based buffer overflow vulnerability in Adobe Reader before 9.4.2 (Linux)ID: oval:org.secpod.oval:def:363 | Date: (C)2011-03-11 (M)2022-10-10 |
Class: VULNERABILITY | Family: unix |
The host is installed with Adobe Reader before 9.4.2 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the rt3d.dll of the application which is caused by improper bounds checking in rt3d.dll when parsing certain file which explicitly trusts a length embedded within a particular file in order to calculate the length of a buffer that will then duplicate an arbitrarily sized string into a statically sized buffer located on the stack. Successful exploitation allows remote attacker to execute arbitrary code or cause a denial of service via unspecified vectors.