Home / vulnerabilitiesPDF  

VeryPDF Code Execution

Posted on 13 April 2011
Source : packetstormsecurity.org Link

 

nSense Vulnerability Research Security Advisory NSENSE-2011-001
---------------------------------------------------------------

Affected Vendor: VeryPDF (+ Multiple others, eg
Barcode Reader Tookit version 7.4.1.3 )
Affected Product: PDF Extract TIFF COM (prior to April 8'th)
Platform: Windows
Impact: Local/Remote code execution
Vendor response: Patch
CVE: None
CVSS2: 9.3 - (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Credit: JODE

Technical details
---------------------------------------------------------------

A PDF file format parsing vulnerability exists in the pdf2tif
parser and can be exploited with a specially crafted input
file. The plugin suffers from a buffer overflow flaw.

Many server side applications use the library when converting
pdf files to images. If an attacker is able to send the
application a malicious file, successful exploitation leads to
code being executed in the context of the running application.

Solution
Upgrade to the latest version of the pdf2tif.dll.

Timeline:
April 1th Contacted vendor
April 1th Vendor responded, requesting gold
support license agreement number.
April 8th Vendor released the fix
April 12th Advisory released

Links:
http://www.nsense.fi http://www.nsense.dk



$$s$$$$s. ,s$$$$s ,S$$$$$s. $$s$$$$s. ,s$$$$s ,S$$$$$s.
$$$ `$$$ ($$( $$$ `$$$ $$$ `$$$ ($$( $$$ `$$$
$$$ $$$ `^$$s. $$$$$$$$$ $$$ $$$ `^$$s. $$$$$$$$$
$$$ $$$ )$$) $$$ $$$ $$$ )$$) $$$
$$$ $$$ ^$$$$$$7 `7$$$$$P $$$ $$$ ^$$$$$$7 `7$$$$$P

D r i v e n b y t h e c h a l l e n g e _

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

 

TOP