lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201003122355.o2CNtgE2007824@www3.securityfocus.com> Date: Fri, 12 Mar 2010 16:55:42 -0700 From: villys777@...il.com To: bugtraq@...urityfocus.com Subject: CVE-2010-0188 Exploit Code # Exploit Title: Adobe Acrobat libtiff Remote Code Execution # Date: 2010-03-12 # Author: villy( http://bugix-security.blogspot.com/) # Software Link: http://adobe.com/ # Version: Adobe Reader 9.x < 9.3.1 # Tested on: windows xp(sp2 and xp3) # CVE : CVE-2010-0188 Full python code on the link : http://bugix-security.blogspot.com/2010/03/adobe-pdf-libtiff-working-exploitcve.html Exploit works with disabled js, and can be remote exploitable with adobe browser plugin.