Bug 877654 (CVE-2014-0527) - VUL-0: CVE-2014-0527: acroread code exec
Summary: VUL-0: CVE-2014-0527: acroread code exec
Status: RESOLVED WONTFIX
Alias: CVE-2014-0527
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Bin Li
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/98754/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-05-14 07:59 UTC by Sebastian Krahmer
Modified: 2014-05-14 10:00 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Krahmer 2014-05-14 07:59:24 UTC
Questionable if this applies to us. The bug is in an ActiveX-control?


ZDI-14-128

This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Adobe Reader. User interaction is required to
exploit this vulnerability in that the target must visit a malicious page or
open a malicious file.

The specific flaw exists within the handling of the AcroPDF ActiveX control. 
The issue lies in the messageHandler property of the control.  By manipulating
the messageHandler's attributes an attacker can force a dangling pointer to be
reused after it has been freed.   An attacker can leverage this vulnerability to
execute code under the context of the current process.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0527
http://www.zerodayinitiative.com/advisories/ZDI-14-128/
Comment 1 Marcus Meissner 2014-05-14 10:00:59 UTC
we can no longer update acrobat reader, as linux support was discontinued.

also activex is windows specific