{"vuid":"VU#896220","idnumber":"896220","name":"Adobe Acrobat contains a remotely exploitable buffer overflow","keywords":["Adobe","Reader","Acrobat","buffer overflow","execute arbitrary code","denial of service","plug-in"],"overview":"A buffer overflow in Adobe Acrobat/Acrobat Reader may allow a remote attacker to execute arbitrary code or cause a denial-of-service condition","clean_desc":"Adobe Acrobat is a suite of applications that allow users to manipulate PDF (Portable Document Format) files. A buffer within a core plug-in for Adobe Acrobat and Acrobat Reader can be overwritten using a specially-crafted PDF document. For more information refer to Adobe Security Advisory 321644.","impact":"If a remote attacker can persuade a user to access a specially crafted PDF file, that attacker may be able to execute arbitrary code or crash the Adobe Acrobat/Acrobat Reader process.","resolution":"Upgrade to unaffected version\nUpgrade to unaffected versions of Adobe Acrobat and Acrobat Reader. For a list of unaffected versions please see Adobe Security Advisory 321644.","workarounds":"Do not accept PDF files from untrusted sources Exploitation occurs by accessing a specially crafted PDF file. By only accessing PDF files from trusted or known sources, the chances of exploitation are reduced.","sysaffected":"","thanks":"This vulnerability was reported by Adobe Systems.","author":"This document was written by Jeff Gennari.","public":["h","t","t","p",":","/","/","w","w","w",".","a","d","o","b","e",".","c","o","m","/","s","u","p","p","o","r","t","/","t","e","c","h","d","o","c","s","/","3","2","1","6","4","4",".","h","t","m","l"],"cveids":["CVE-2005-2470"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-08-12T19:33:44Z","publicdate":"2005-08-16T00:00:00Z","datefirstpublished":"2005-08-16T18:33:49Z","dateupdated":"2005-09-08T20:26:22Z","revision":38,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"12.909375","cam_scorecurrentwidelyknown":"16.4953125","cam_scorecurrentwidelyknownexploited":"30.8390625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.909375,"vulnote":null}