cnvd-2018-05031
Vulnerability from cnvd
Title
多款Adobe产品image conversion模块Enhanced Metafile Format引擎越界内存读取漏洞
Description
Acrobat DC Continuous Track等都是美国奥多比(Adobe)公司的产品。Acrobat DC Continuous Track是一款桌面版PDF解决方案的连续更新版本。Reader DC Continuous Track是一款PDF阅读工具的连续更新版本。image conversion module是其中的一个图片格式转换模块。Enhanced Metafile Format processing engine是其中的一个增强型图元文件格式处理引擎。
多款Adobe产品中的image conversion模块的Enhanced Metafile Format引擎存在越边界读取漏洞。远程攻击者可利用该漏洞执行代码。
Severity
高
VLAI Severity ?
Patch Name
多款Adobe产品image conversion模块Enhanced Metafile Format引擎越界内存读取漏洞的补丁
Patch Description
Acrobat DC Continuous Track等都是美国奥多比(Adobe)公司的产品。Acrobat DC Continuous Track是一款桌面版PDF解决方案的连续更新版本。Reader DC Continuous Track是一款PDF阅读工具的连续更新版本。image conversion module是其中的一个图片格式转换模块。Enhanced Metafile Format processing engine是其中的一个增强型图元文件格式处理引擎。
多款Adobe产品中的image conversion模块的Enhanced Metafile Format引擎存在越边界读取漏洞。远程攻击者可利用该漏洞执行代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布漏洞修复程序,请及时关注更新: https://helpx.adobe.com/security/products/acrobat/apsb18-02.html
Reference
https://helpx.adobe.com/security/products/acrobat/apsb18-02.html
Impacted products
| Name | ['Adobe Acrobat DC (Continuous Track) <=2018.009.20050', 'Adobe Acrobat Reader DC (Continuous Track) <=2018.009.20050', 'Adobe Acrobat 2017 <=2017.011.30070', 'Adobe Acrobat Reader 2017 <=2017.011.30070', 'Adobe Acrobat Reader DC (Classic Track) <=2015.006.30394', 'Adobe Acrobat DC (Classic Track) <=2015.006.30394'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "102996"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-4885"
}
},
"description": "Acrobat DC Continuous Track\u7b49\u90fd\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Acrobat DC Continuous Track\u662f\u4e00\u6b3e\u684c\u9762\u7248PDF\u89e3\u51b3\u65b9\u6848\u7684\u8fde\u7eed\u66f4\u65b0\u7248\u672c\u3002Reader DC Continuous Track\u662f\u4e00\u6b3ePDF\u9605\u8bfb\u5de5\u5177\u7684\u8fde\u7eed\u66f4\u65b0\u7248\u672c\u3002image conversion module\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u56fe\u7247\u683c\u5f0f\u8f6c\u6362\u6a21\u5757\u3002Enhanced Metafile Format processing engine\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u589e\u5f3a\u578b\u56fe\u5143\u6587\u4ef6\u683c\u5f0f\u5904\u7406\u5f15\u64ce\u3002\r\n\r\n\u591a\u6b3eAdobe\u4ea7\u54c1\u4e2d\u7684image conversion\u6a21\u5757\u7684Enhanced Metafile Format\u5f15\u64ce\u5b58\u5728\u8d8a\u8fb9\u754c\u8bfb\u53d6\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4ee3\u7801\u3002",
"discovererName": "Ke Liu of Tencent\u0027s Xuanwu LAB working with Trend Micro\u0027s Zero Day Initiative",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-05031",
"openTime": "2018-03-13",
"patchDescription": "Acrobat DC Continuous Track\u7b49\u90fd\u662f\u7f8e\u56fd\u5965\u591a\u6bd4\uff08Adobe\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Acrobat DC Continuous Track\u662f\u4e00\u6b3e\u684c\u9762\u7248PDF\u89e3\u51b3\u65b9\u6848\u7684\u8fde\u7eed\u66f4\u65b0\u7248\u672c\u3002Reader DC Continuous Track\u662f\u4e00\u6b3ePDF\u9605\u8bfb\u5de5\u5177\u7684\u8fde\u7eed\u66f4\u65b0\u7248\u672c\u3002image conversion module\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u56fe\u7247\u683c\u5f0f\u8f6c\u6362\u6a21\u5757\u3002Enhanced Metafile Format processing engine\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u589e\u5f3a\u578b\u56fe\u5143\u6587\u4ef6\u683c\u5f0f\u5904\u7406\u5f15\u64ce\u3002\r\n\r\n\u591a\u6b3eAdobe\u4ea7\u54c1\u4e2d\u7684image conversion\u6a21\u5757\u7684Enhanced Metafile Format\u5f15\u64ce\u5b58\u5728\u8d8a\u8fb9\u754c\u8bfb\u53d6\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eAdobe\u4ea7\u54c1image conversion\u6a21\u5757Enhanced Metafile Format\u5f15\u64ce\u8d8a\u754c\u5185\u5b58\u8bfb\u53d6\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Adobe Acrobat DC (Continuous Track) \u003c=2018.009.20050",
"Adobe Acrobat Reader DC (Continuous Track) \u003c=2018.009.20050",
"Adobe Acrobat 2017 \u003c=2017.011.30070",
"Adobe Acrobat Reader 2017 \u003c=2017.011.30070",
"Adobe Acrobat Reader DC (Classic Track) \u003c=2015.006.30394",
"Adobe Acrobat DC (Classic Track) \u003c=2015.006.30394"
]
},
"referenceLink": "https://helpx.adobe.com/security/products/acrobat/apsb18-02.html",
"serverity": "\u9ad8",
"submitTime": "2018-02-14",
"title": "\u591a\u6b3eAdobe\u4ea7\u54c1image conversion\u6a21\u5757Enhanced Metafile Format\u5f15\u64ce\u8d8a\u754c\u5185\u5b58\u8bfb\u53d6\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…