exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Zero Day Initiative Advisory 11-300 https://packetstormsecurity.com/files/106246/ZDI-11-300.txt https://packetstormsecurity.com/files/106246/ZDI-11-300.txt https://packetstormsecurity.com/files/106246/Zero-Day-Initiative-Advisory-11-300.html Wed, 26 Oct 2011 17:59:07 GMT Zero Day Initiative Advisory 11-300 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the way Adobe handles PICT images. When Adobe parses a PICT image containing an 0x10 opcode the following word in the file will be interpreted as a loop counter that copies data from the file into a heap buffer that has been created using the height and with of the picture. The resulting heap overflow can result in remote code execution under the rights of the current user.

Related Files

No related files
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close