Adobe Acrobat Reader Base URI Unicode String Heap Buffer Overflow
2021-09-17 22:22:00 Author: blog.exodusintel.com(查看原文) 阅读量:38 收藏

EXP-2021-0014

A heap buffer overflow vulnerability exists in the IA32.api module of Adobe Acrobat and Acrobat Reader DC. Upon parsing a specially crafted PDF document containing URI entries with URI dictionaries and a specially crafted base URL defined with raw Unicode strings can trigger the vulnerability to achieve remote code execution.

Vulnerability Identifiers

  • Exodus Intelligence: EXP-2021-0014
  • MITRE CVE: CVE-2021-39863

Vulnerability Metrics

  • CVSS Score: 8.8

Vendor References

  • https://helpx.adobe.com/security/products/acrobat/apsb21-55.html

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to affected vendor: June 28th, 2021
  • Disclosed to public: September 14th, 2021

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].

Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.


文章来源: https://blog.exodusintel.com/2021/09/17/adobe-acrobat-reader-base-uri-unicode-string-heap-buffer-overflow/?utm_source=rss&utm_medium=rss&utm_campaign=adobe-acrobat-reader-base-uri-unicode-string-heap-buffer-overflow
如有侵权请联系:admin#unsafe.sh