[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Stack-based buffer overflow vulnerability in Adobe Reader before 9.4.2 (Linux)

ID: oval:org.secpod.oval:def:363Date: (C)2011-03-11   (M)2022-10-10
Class: VULNERABILITYFamily: unix




The host is installed with Adobe Reader before 9.4.2 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the rt3d.dll of the application which is caused by improper bounds checking in rt3d.dll when parsing certain file which explicitly trusts a length embedded within a particular file in order to calculate the length of a buffer that will then duplicate an arbitrarily sized string into a statically sized buffer located on the stack. Successful exploitation allows remote attacker to execute arbitrary code or cause a denial of service via unspecified vectors.

Platform:
Linux
Product:
Adobe Reader
Reference:
CVE-2011-0606
CVE    1
CVE-2011-0606
CPE    1
cpe:/a:adobe:reader:::x86

© SecPod Technologies