ID

VAR-201405-0218


CVE

CVE-2014-0527


TITLE

Windows and Mac OS X Run on Adobe Reader and Acrobat Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2014-002487

DESCRIPTION

Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of the AcroPDF ActiveX control. The issue lies in the messageHandler property of the control. By manipulating the messageHandler's attributes an attacker can force a dangling pointer to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. Failed exploit attempts likely result in denial-of-service conditions. The affected products are: Adobe Reader 11.x versions prior to 11.0.07 Adobe Reader 10.x versions prior to 10.1.10 Adobe Acrobat 11.x versions prior to 11.0.07 Adobe Acrobat 10.x versions prior to 10.1.10. Adobe Reader is a free PDF file reader, and Acrobat is a PDF file editing and conversion tool

Trust: 2.61

sources: NVD: CVE-2014-0527 // JVNDB: JVNDB-2014-002487 // ZDI: ZDI-14-128 // BID: 67367 // VULHUB: VHN-68020

AFFECTED PRODUCTS

vendor:adobemodel:acrobat readerscope:eqversion:11.0.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:11.0.2

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:10.1.9

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:11.0.1

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:11.0.4

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:11.0.5

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:10.1.7

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:11.0

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:10.1.8

Trust: 1.6

vendor:adobemodel:acrobat readerscope:eqversion:11.0.3

Trust: 1.6

vendor:adobemodel:acrobatscope:eqversion:10.1.3

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:10.1.2

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:10.1.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:10.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:10.0.3

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:10.0.2

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:10.0.1

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:10.0

Trust: 1.3

vendor:adobemodel:acrobatscope:eqversion:10.1.5

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.1.4

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:11.0.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:10.1.9

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:10.1.7

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:10.1.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.1.5

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:11.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:11.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.1.2

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:11.0

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:10.1.4

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.1.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.1.1

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:11.0.3

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.0.2

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.1.6

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:11.0.6

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:10.1.8

Trust: 1.0

vendor:adobemodel:acrobatscope:eqversion:11.0.1

Trust: 1.0

vendor:adobemodel:acrobat readerscope:eqversion:10.1

Trust: 1.0

vendor:adobemodel:acrobatscope:ltversion:10.x

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:11.x

Trust: 0.8

vendor:adobemodel:acrobatscope:eqversion:xi (11.0.07)

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:10.x

Trust: 0.8

vendor:adobemodel:acrobatscope:eqversion:x (10.1.10)

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:11.x

Trust: 0.8

vendor:adobemodel:readerscope:eqversion:xi (11.0.07)

Trust: 0.8

vendor:adobemodel:readerscope:eqversion:x (10.1.10)

Trust: 0.8

vendor:adobemodel:readerscope: - version: -

Trust: 0.7

vendor:adobemodel:readerscope:eqversion:10.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0

Trust: 0.3

sources: ZDI: ZDI-14-128 // BID: 67367 // JVNDB: JVNDB-2014-002487 // CNNVD: CNNVD-201405-252 // NVD: CVE-2014-0527

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-0527
value: HIGH

Trust: 1.0

NVD: CVE-2014-0527
value: HIGH

Trust: 0.8

ZDI: CVE-2014-0527
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-201405-252
value: CRITICAL

Trust: 0.6

VULHUB: VHN-68020
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-0527
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2014-0527
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-68020
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-14-128 // VULHUB: VHN-68020 // JVNDB: JVNDB-2014-002487 // CNNVD: CNNVD-201405-252 // NVD: CVE-2014-0527

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-68020 // JVNDB: JVNDB-2014-002487 // NVD: CVE-2014-0527

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201405-252

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201405-252

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-002487

PATCH

title:APSB14-15url:http://helpx.adobe.com/security/products/reader/apsb14-15.html

Trust: 1.5

title:APSB14-15url:http://helpx.adobe.com/jp/security/products/reader/apsb14-15.html

Trust: 0.8

title:アドビ システムズ社 Adobe Reader の脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/adobe/20140515.html

Trust: 0.8

sources: ZDI: ZDI-14-128 // JVNDB: JVNDB-2014-002487

EXTERNAL IDS

db:NVDid:CVE-2014-0527

Trust: 3.5

db:JVNDBid:JVNDB-2014-002487

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2001

Trust: 0.7

db:ZDIid:ZDI-14-128

Trust: 0.7

db:CNNVDid:CNNVD-201405-252

Trust: 0.7

db:BIDid:67367

Trust: 0.4

db:VULHUBid:VHN-68020

Trust: 0.1

sources: ZDI: ZDI-14-128 // VULHUB: VHN-68020 // BID: 67367 // JVNDB: JVNDB-2014-002487 // CNNVD: CNNVD-201405-252 // NVD: CVE-2014-0527

REFERENCES

url:http://helpx.adobe.com/security/products/reader/apsb14-15.html

Trust: 2.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-0527

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20140514-adobereader.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2014/at140023.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-0527

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/topics/?seq=13798

Trust: 0.8

url:http://www.adobe.com/products/acrobat/

Trust: 0.3

url:http://www.adobe.com/products/reader/

Trust: 0.3

sources: ZDI: ZDI-14-128 // VULHUB: VHN-68020 // BID: 67367 // JVNDB: JVNDB-2014-002487 // CNNVD: CNNVD-201405-252 // NVD: CVE-2014-0527

CREDITS

chkr_d591

Trust: 0.7

sources: ZDI: ZDI-14-128

SOURCES

db:ZDIid:ZDI-14-128
db:VULHUBid:VHN-68020
db:BIDid:67367
db:JVNDBid:JVNDB-2014-002487
db:CNNVDid:CNNVD-201405-252
db:NVDid:CVE-2014-0527

LAST UPDATE DATE

2024-11-23T23:09:23.302000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-14-128date:2014-05-13T00:00:00
db:VULHUBid:VHN-68020date:2014-05-14T00:00:00
db:BIDid:67367date:2014-05-21T00:42:00
db:JVNDBid:JVNDB-2014-002487date:2014-05-15T00:00:00
db:CNNVDid:CNNVD-201405-252date:2014-05-16T00:00:00
db:NVDid:CVE-2014-0527date:2024-11-21T02:02:19.270

SOURCES RELEASE DATE

db:ZDIid:ZDI-14-128date:2014-05-13T00:00:00
db:VULHUBid:VHN-68020date:2014-05-14T00:00:00
db:BIDid:67367date:2014-05-13T00:00:00
db:JVNDBid:JVNDB-2014-002487date:2014-05-15T00:00:00
db:CNNVDid:CNNVD-201405-252date:2014-05-16T00:00:00
db:NVDid:CVE-2014-0527date:2014-05-14T11:13:05.477