Lucene search

K
zdiBinaryproofZDI-11-310
HistoryOct 26, 2011 - 12:00 a.m.

Adobe Reader Compound Glyph Index Sign Extension Remote Code Execution Vulnerability

2011-10-2600:00:00
binaryproof
www.zerodayinitiative.com
15

0.354 Low

EPSS

Percentile

97.2%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Adobe Reader handles compound glyphs. When a glyph has more then 0x7FFF β€˜numberOfContours’ a sign extension occurs resulting in a buffer under-read. Simple glyphs are checked when Adobe Reader parses the font info, but the value for β€˜numberOfContours’ in an compound glyph is the sum of all its child glyphs, and this is not checked. This could result in remote code execution under the context of the current user.