Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-39863 PoC — Adobe Acrobat和Adobe Reader 安全漏洞

Source
Associated Vulnerability
Title:Adobe Acrobat和Adobe Reader 安全漏洞 (CVE-2021-39863)
Description:Adobe Acrobat和Adobe Reader都是美国奥多比(Adobe)公司的产品。Adobe Acrobat是一套PDF文件编辑和转换工具。Adobe Reader是一套PDF文档阅读软件。 Adobe Acrobat 和 Reader存在安全漏洞,该漏洞源于处理 PDF 文件时的边界错误。远程攻击者可以欺骗受害者打开特制的 PDF 文件,触发基于堆的缓冲区溢出并在目标系统上执行任意代码。
Readme
# CVE-2021-39863

- Adobe Acrobat Reader DC 21.005.20048.43252 (32 bit)
  - Bypass ASLR, DEP
  - Non Bypass CFG

<br>

- exploit.pdf : Exploit PDF
- exploit.js : Embedded JS Script in exploit.pdf
- exploit example
  
  ![exploit](https://github.com/user-attachments/assets/115db10e-e113-4e0f-9e56-aa8aef5ca3a3)



# REFERENCE
- Exodus Blog, Analysis of a Heap Buffer-Overflow Vulnerability in Adobe Acrobat Reader DC
https://blog.exodusintel.com/2021/10/04/analysis-of-a-heap-buffer-overflow-vulnerability-in-adobe-acrobat-reader-dc-2/?utm_source=feedly&utm_medium=rss&utm_campaign=analysis-of-a-heap-buffer-overflow-vulnerability-in-adobe-acrobat-reader-dc-2
File Snapshot

[4.0K] /data/pocs/00bfa6204138e50d1afcee42cb51150f3c6457ef ├── [6.2K] exploit.js ├── [623K] exploit.mp4 ├── [7.9K] exploit.pdf └── [ 660] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.