VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : 脆弱性脅威分析用情報の定型データ配信
[ about VRDA Feed | JPCERT/CC



 
分析対象脆弱性情報 (リビジョン番号 : 1) [ Download XML
VRDA-091204-001
Adobe Illustrator の EPS ファイル処理にヒープバッファオーバーフローの脆弱性
http://www.vupen.com/english/advisories/2009/3396

A vulnerability has been identified in Adobe Illustrator, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a memory corruption error when processing Encapsulated Postscript (.eps) files containing overly long data, which could allow attackers to crash an affected application or execute arbitrary code by tricking a user into opening a specially crafted file.




この情報について
分析情報提供元:
JPCERT/CC
初版公開日:
2009-12-04
分析対象脆弱性情報の分類:
その他(一般記事・報道記事など)
最終更新日:
2009-12-04




脆弱性の影響を受ける製品の識別子
lapt:/a:adobe:illustrator     (Adobe Illustrator)
 


脆弱性の分析内容
[分析に利用した情報の信頼性] [?]
 [?]

 [?]
X [?]

[影響の大きさ] [?]
 [?]

小~中 [?]
中~大 [?]
X [?]

[攻撃経路] [?]
物理アクセス [?]

ローカルマシン上 [?]
同一セグメント上 [?]
X インターネット経由 [?]

[認証レベル] [?]
管理者アカウント [?]

一般ユーザアカウント [?]
フリーアカウント [?]
X 不要 [?]

[攻撃成立に必要なユーザの関与] [?]
複雑 [?]

X 簡単 [?]
不要 [?]

[攻撃の難易度] [?]
 [?]

中~高 [?]
低~中 [?]
 [?]

[対策の有無] [?]
公式パッチ有り [?]

公式回避策有り [?]
非公式回避策・パッチ有り [?]
X なし [?]

[インシデントの発生状況] [?]
活動なし [?]

X Exploit/PoCあり [?]
活動あり [?]

関連情報




参考情報
Adobe Systems APSA09-06 Adobe Illustrator CS4 と Illustrator CS3に関するセキュリティ情報
Adobe is aware of a report of a buffer overflow vulnerability in Adobe Illustrator CS4 and Adobe Illustrator CS3 that could lead to arbitrary code execution. Adobe plans to make available an update to Adobe Illustrator to resolve the issue by January 8, 2010. Adobe recommends customers avoid opening .eps files from unknown or untrusted sources in Illustrator until a patch is available.





Copyright © 2009 JPCERT/CC All Rights Reserved.