vulnerability has been discovered in the most popular and most feature-rich PDF
reader, Adobe Acrobat Reader DC.
The vulnerability has the power
to perform a stack-based buffer overflow all the executing the orbitary code
when users open the vulnerable Adobe document.This Critical RCE
vulnerability affected the version of Adobe Acrobat Reader DC 2018.009.20044
is quite simple to fathom it has a major user base, is the most prevalent and
most feature-rich PDF reader and is usually a default PDF reader on systems and
incorporates into web browsers as a plugin for rendering PDFs.
This most likely makes it substantially easier for an attacker to send the specific
crafted malicious document by means of an email or deceiving a user into
visiting a malicious web page and influence the user execute the malicious
document and trigger this vulnerability.Considering the Remote Code Execution Working Flow where the
it to work as PDF form.
the vulnerability for an additional attack surface.
file with overly large Document ID field specified in the trailer, according to
Aleksandar Nikolic of Cisco Talos, it
stack-based buffer overflow can occur when encoding the bytes to a hex string.
this critical Remote code execution vulnerability.
of document ID field is hex-decoded into a sequence of bytes. When a this.docID
hex string again function at EScript+0x9e7c0”
patch has been made and released an update on 2018 -02-13 with CVE-2018-4901.
thanks you RSS link