Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:STC:ADOBE:U3D-CLODMESH-MC

Severity

Major

Recommended

No

Recommended Action

Drop

Category

HTTP

Keywords

Adobe Acrobat Reader U3D CLODMeshDeclaration Memory Corruption

Release Date

2011/07/25

Update Number

1960

Supported Platforms

idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Adobe Acrobat Reader U3D CLODMeshDeclaration Memory Corruption


This signature detects attempts to exploit a known vulnerability against Adobe Acrobat and Reader. A successful attack can lead to arbitrary code execution.

Extended Description

Adobe Reader and Acrobat are prone to a buffer-overflow vulnerability because the applications fail to perform adequate boundary-checks on user-supplied data. Successfully exploiting this issue may allow attackers to execute arbitrary code within the context of the affected applications. Failed exploit attempts will result in a denial-of-service condition. This issue affects versions *prior to* Reader and Acrobat 7.1.4, 8.1.7, and 9.2. This issue was previously covered in BID 36638 (Adobe Reader and Acrobat October 2009 Multiple Remote Vulnerabilities), but has been given its own record to better document it.

Affected Products

  • Adobe acrobat 7.0.0
  • Adobe acrobat 7.0.1
  • Adobe acrobat 7.0.2
  • Adobe acrobat 7.0.3
  • Adobe acrobat 9.1.1
  • Adobe acrobat_3d 8.1.2
  • Adobe acrobat_3d 8.1.3
  • Adobe acrobat_3d
  • Adobe acrobat_professional 7.0.0
  • Adobe acrobat_professional 7.0.1
  • Adobe acrobat_professional 7.0.2
  • Adobe acrobat_professional 7.0.3
  • Adobe acrobat_professional 7.0.4
  • Adobe acrobat_professional 7.0.5
  • Adobe acrobat_professional 7.0.6
  • Adobe acrobat_professional 7.0.7
  • Adobe acrobat_professional 7.0.8
  • Adobe acrobat_professional 7.0.9
  • Adobe acrobat_professional 7.1
  • Adobe acrobat_professional 7.1.1
  • Adobe acrobat_professional 7.1.3
  • Adobe acrobat_professional 8.0
  • Adobe acrobat_professional 8.1
  • Adobe acrobat_professional 8.1.1
  • Adobe acrobat_professional 8.1.2
  • Adobe acrobat_professional 8.1.2 Security Update 1
  • Adobe acrobat_professional 8.1.3
  • Adobe acrobat_professional 8.1.4
  • Adobe acrobat_professional 8.1.6
  • Adobe acrobat_professional 9
  • Adobe acrobat_professional 9.1
  • Adobe acrobat_professional 9.1.2
  • Adobe acrobat_professional 9.1.3
  • Adobe acrobat_reader_(unix) 7.0.0
  • Adobe acrobat_reader_(unix) 7.0.1
  • Adobe acrobat_standard 7.0.0
  • Adobe acrobat_standard 7.0.1
  • Adobe acrobat_standard 7.0.2
  • Adobe acrobat_standard 7.0.3
  • Adobe acrobat_standard 7.0.4
  • Adobe acrobat_standard 7.0.5
  • Adobe acrobat_standard 7.0.6
  • Adobe acrobat_standard 7.0.7
  • Adobe acrobat_standard 7.0.8
  • Adobe acrobat_standard 7.1
  • Adobe acrobat_standard 7.1.1
  • Adobe acrobat_standard 7.1.3
  • Adobe acrobat_standard 8.0
  • Adobe acrobat_standard 8.1
  • Adobe acrobat_standard 8.1.1
  • Adobe acrobat_standard 8.1.2
  • Adobe acrobat_standard 8.1.3
  • Adobe acrobat_standard 8.1.4
  • Adobe acrobat_standard 8.1.6
  • Adobe acrobat_standard 9
  • Adobe acrobat_standard 9.1
  • Adobe acrobat_standard 9.1.2
  • Adobe acrobat_standard 9.1.3
  • Adobe reader 7.0.0
  • Adobe reader 7.0.1
  • Adobe reader 7.0.2
  • Adobe reader 7.0.3
  • Adobe reader 7.0.4
  • Adobe reader 7.0.5
  • Adobe reader 7.0.6
  • Adobe reader 7.0.7
  • Adobe reader 7.0.8
  • Adobe reader 7.0.9
  • Adobe reader 7.1
  • Adobe reader 7.1.1
  • Adobe reader 7.1.2
  • Adobe reader 7.1.3
  • Adobe reader 8.0
  • Adobe reader 8.1
  • Adobe reader 8.1.1
  • Adobe reader 8.1.2
  • Adobe reader 8.1.2 Security Update 1
  • Adobe reader 8.1.3
  • Adobe reader 8.1.4
  • Adobe reader 8.1.5
  • Adobe reader 8.1.6
  • Adobe reader 9
  • Adobe reader 9.1
  • Adobe reader 9.1.1
  • Adobe reader 9.1.2
  • Adobe reader 9.1.3
  • Gentoo linux
  • Red_hat desktop_extras 3
  • Red_hat desktop_extras 4
  • Red_hat enterprise_linux_as_extras 3
  • Red_hat enterprise_linux_as_extras 4
  • Red_hat enterprise_linux_desktop_supplementary 5 Client
  • Red_hat enterprise_linux_es_extras 3
  • Red_hat enterprise_linux_es_extras 4
  • Red_hat enterprise_linux_extras 3
  • Red_hat enterprise_linux_extras 4
  • Red_hat enterprise_linux_supplementary 5 Server
  • Red_hat enterprise_linux_ws_extras 3
  • Red_hat enterprise_linux_ws_extras 4
  • Sun solaris 10 Sparc
  • Suse opensuse 10.3
  • Suse opensuse 11.0
  • Suse opensuse 11.1
  • Suse suse_linux_enterprise_desktop 10 SP2
  • Suse suse_linux_enterprise_desktop 10 SP3
  • Suse suse_linux_enterprise_desktop 11

References

  • BugTraq: 36689
  • CVE: CVE-2009-2994

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out