Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-15968 PoC — Adobe Acrobat和Reader 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Adobe Acrobat和Reader 缓冲区错误漏洞 (CVE-2018-15968)
Description:Adobe Acrobat和Reader都是美国奥多比(Adobe)公司的产品。前者是一套PDF文件编辑和转换工具,后者是一套PDF文档阅读软件。 Adobe Acrobat和Reader中存在越界读取漏洞。远程攻击者可利用该漏洞获取敏感信息。基于Windows和macOS平台的以下产品和版本受到影响:Adobe Acrobat DC(Continuous)2018.011.20063及之前版本,Acrobat 2017(Classic 2017)2017.011.30102及之前版本,Acrobat D
Readme
# Adobe Reader Out-Of-Bounds Read Information Disclosure Vulnerability

# Vulnerability

Improper Restriction of Operations within the Bounds of a Memory Buffer Vulnerability


# Vulnerability Description

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Adobe Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious PDF file.

The specific flaw exists within the parsing of **malformed PDF** file.  The issue results from the lack of proper validation of user-supplied data which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to **execute code** in the context of the current process.


# CVE ID

CVE-2018-15968


# Vendor

www.adobe.com


# Product

* Acrobat DC 2018.011.20063 and prior
* Acrobat Reader DC 2018.011.20063 and prior
* Acrobat 2017 2017.011.30102 and prior
* Acrobat Reader 2017.011.30102 and prior
* Acrobat DC 2015.006.30452 and prior
* Acrobat Reader DC 2015.006.30452 and prior


# Disclosure Timeline

1. 08 January 2018 - Reported to vendor
2. 01 October 2018 - Coordinated public release of advisory


# Credits

Ashfaq Ansari - Project Srishti


# Vendor Advisory

https://helpx.adobe.com/security/products/acrobat/apsb18-30.html
File Snapshot

[4.0K] /data/pocs/ed69456d1ea6a2be080f0fab024bed7a427aa106 └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.