|
|
|
Credit:
The information has been provided by iDefense.
The original article can be found at: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=749
|
|
Vulnerable Systems:
* Adobe PageMaker version 7.0.1 (with CVE-2007-5169 patch)
Immune Systems:
* Adobe PageMaker version 7.0.1 (with APSA08-10 Patch)
A vulnerability exists within the handling of PMD files, the native file format for storing PageMaker documents. When parsing a malformed PMD file, data from the file is copied into a buffer without proper validation. This results in an exploitable stack based buffer overflow.
Analysis:
Exploitation of this vulnerability could allow an attacker to execute arbitrary code with the privileges of the user opening the file. Exploitation would require that an attacker hosts a maliciously crafted document on a website and entice users to visit the site. An attacker could also e-mail the malicious document and use social engineering techniques to trick the e-mail recipient into opening the document.
V. WORKAROUND
iDefense is currently unaware of any workarounds for this issue.
VI. VENDOR RESPONSE
Adobe categorizes this as a critical issue and recommends affected users patch their installations, and avoid opening PageMaker files from untrusted or unknown sources. A patch is available from the vendor at the following URL:
http://www.adobe.com/support/security/bulletins/downloads/APSA08-10.zip
CVE Information:
CVE-2008-6432
Disclosure timeline:
12/18/2007 - Initial vendor notification
12/19/2007 - Initial vendor response
06/09/2008 - Vendor follow-up
10/29/2008 - Vendor releases patch.
|
|
|
|