← Advisories

Adobe Reader 9.3.2 (CoolType.dll) Remote Memory Corruption / DoS Vulnerability

High
Advisory ID
ZSL-2010-4943
Release Date
29 June 2010
Vendor
Adobe Systems Incorporated - http://www.adobe.com
Affected Version
9.3.1 and 9.3.2
Tested On
Microsoft Windows XP Professional SP3 (English), Microsoft Windows XP Professional SP2 (English), Microsoft Windows 7 Ultimate, GNU/Linux Ubuntu Desktop 9.10 (i386) 32-bit, GNU/Linux Fedora 10 (Cambridge) / 2.6.27.41-170.2.117.fc10.i686
Summary

Adobe Reader software is the global standard for electronic document sharing. It is the only PDF file viewer that can open and interact with all PDF documents. Use Adobe Reader to view, search, digitally sign, verify, print, and collaborate on Adobe PDF files.

Description

Adobe Reader suffers from a remote memory corruption vulnerability that causes the application to crash while processing the malicious .PDF file. The issue is triggered when the reader tries to initialize the CoolType Typography Engine (cooltype.dll). This vulnerability also affects and crashes major browsers like: Mozilla Firefox, Opera and Apple Safari. Google Chrome & IE does not crash. Talking about Blended Threat Vulnerabilities ;).

(bd0.e14): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=313100ee ebx=0211a722 ecx=00000031 edx=02e091a4 esi=00017e58 edi=00000000 eip=08075dc2 esp=0012d478 ebp=0012d488 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206 CoolType!CTInit+0x2f827: 08075dc2 660fb644322c movzx ax,byte ptr [edx+esi+2Ch] ds:0023:02e21028=??
Proof of Concept
Disclosure Timeline
15.03.2010Vulnerability discovered.
18.04.2010Vendor informed.
18.04.2010Vendor replied.
07.05.2010Asked vendor for confirmation.
07.05.2010Vendor confirms vulnerability.
03.06.2010Asked vendor for status.
03.06.2010Vendor replied.
24.06.2010Vendor reveals patch release date.
29.06.2010Coordinated public advisory.
Credits
Vulnerability discovered by Gjoko Krstic
High five to Wendy and David
References
Changelog
29.06.2010Initial release
30.06.2010Added reference [3], [4], [5], [6], [7], [8], [9] and [10]
01.07.2010Added reference [11], [12], [13], [14], [15], [16], [17], [18] and [19]
02.07.2010Added reference [20]