[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BANLkTikd5seqMBffrfxHzaATO5QAUc1Xjg@mail.gmail.com>
Date: Wed, 13 Apr 2011 11:32:28 +0300
From: Henri Lindberg <henri+fulldisclosure@...nse.fi>
To: full-disclosure@...ts.grok.org.uk
Subject: nSense-2011-001: VeryPDF pdf2tif
nSense Vulnerability Research Security Advisory NSENSE-2011-001
---------------------------------------------------------------
Affected Vendor: VeryPDF (+ Multiple others, eg
Barcode Reader Tookit version 7.4.1.3 )
Affected Product: PDF Extract TIFF COM (prior to April 8'th)
Platform: Windows
Impact: Local/Remote code execution
Vendor response: Patch
CVE: None
CVSS2: 9.3 - (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Credit: JODE
Technical details
---------------------------------------------------------------
A PDF file format parsing vulnerability exists in the pdf2tif
parser and can be exploited with a specially crafted input
file. The plugin suffers from a buffer overflow flaw.
Many server side applications use the library when converting
pdf files to images. If an attacker is able to send the
application a malicious file, successful exploitation leads to
code being executed in the context of the running application.
Solution
Upgrade to the latest version of the pdf2tif.dll.
Timeline:
April 1th Contacted vendor
April 1th Vendor responded, requesting gold
support license agreement number.
April 8th Vendor released the fix
April 12th Advisory released
Links:
http://www.nsense.fi http://www.nsense.dk
$$s$$$$s. ,s$$$$s ,S$$$$$s. $$s$$$$s. ,s$$$$s ,S$$$$$s.
$$$ `$$$ ($$( $$$ `$$$ $$$ `$$$ ($$( $$$ `$$$
$$$ $$$ `^$$s. $$$$$$$$$ $$$ $$$ `^$$s. $$$$$$$$$
$$$ $$$ )$$) $$$ $$$ $$$ )$$) $$$
$$$ $$$ ^$$$$$$7 `7$$$$$P $$$ $$$ ^$$$$$$7 `7$$$$$P
D r i v e n b y t h e c h a l l e n g e _
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists