![]() In busy allocation ( DPH_HEAP_BLOCK: UserAddr UserSize - VirtAddr VirtSize)Ħ72ba8b0 verifier!AVrfDebugPageHeapAllocate+0x00000240ħ714f10e ntdll!RtlDebugAllocateHeap+0x00000039ħ70b70f0 ntdll!RtlpAllocateHeap+0x000000f0ħ70b6e3c ntdll!RtlpAllocateHeapInternal+0x0000104cħ70b5dde ntdll!RtlAllocateHeap+0x0000003eħ5840166 ucrtbase!_malloc_base+0x00000026Ĩ0d11770 PDFLibTool!CxManagedImage::Set+0x000c27b0Ĩ0a09dcd PDFLibTool!SolidWatermark::CSolidImageWatermarkOptBase::getWatermarkFileName+0x0000095dĨ0b1e9ed PDFLibTool!CPdfPageContentProcessor::ProcessGeneralCommand+0x00001d6dĨ0b1c398 PDFLibTool!CPdfPageContentProcessor::ProcessCommandStreamMultiThread+0x000005a8Ĩ0b1bdce PDFLibTool!CPdfPageContentProcessor::ProcessCommandStream+0x0000002eĨ48d7fad SecurePdfSDK!CLayoutPage::PerTextContent+0x0000004dĨ48ffbf4 SecurePdfSDK!CPdfOCRPageRenderTools::IsPageScanned+0x00000174Ĩ0b17800 PDFLibTool!CPdfDocumentImplEx::RenderPDFDocument+0x00000410Ġ:000> kb # ChildEBP RetAddr Args to Child (1734.15d4): Access violation - code c0000005 (first chance)įirst chance exceptions are reported before any exception handling. Zscaler ThreatLabz created a PoC file that will cause the following crash. The vulnerability can be triggered by opening a specially crafted PDF file and exporting it to a Microsoft Word document. Exploitation of this issue requires user interaction in that a victim must open a malicious PDF file.Īcrobat DC Continuous 21.007.20095 and earlier versions in WindowsĪcrobat DC Continuous 21.007.20096 and earlier versions in macOSĪcrobat 2020 Classic 2020 20.004.30015 and earlier versions in Windows & macOSĪcrobat 2017 Classic 2017 17.011.30202 and earlier versions in Windows & macOSįoxit PDF Editor 11.5 and all previous 11.x versions, 10.9 and earlier An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Foxit’s PDF Editor is also impacted by this vulnerability since it also uses the Solid Framework for the conversion of PDF files to other file formats.ĬVE-2021-40729 is an out-of-bounds read vulnerability that could potentially lead to disclosure of sensitive memory. Adobe uses the Solid Framework for the conversion of PDF files to Microsoft Office files. In this blog, we present our analysis of this vulnerability in the Adobe Acrobat Pro DC Solid Framework. Among these vulnerabilities is an out-of-bounds read (CVE-2021-40729) that was discovered by Zscaler’s ThreatLabz. In October 2021, Adobe released a security update for vulnerabilities in Adobe Acrobat and Reader.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |