nSense-2011-001: VeryPDF pdf2tif Apr 13 2011 08:28AM
Henri Lindberg henri+lists (at) nsense (dot) fi [email concealed] (henri+lists nsense fi)
nSense Vulnerability Research Security Advisory NSENSE-2011-001

Affected Vendor: VeryPDF (+ Multiple others, eg
Barcode Reader Tookit version )
Affected Product: PDF Extract TIFF COM (prior to April 8'th)
Platform: Windows
Impact: Local/Remote code execution
Vendor response: Patch
CVE: None
CVSS2: 9.3 - (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Credit: JODE

Technical details

A PDF file format parsing vulnerability exists in the pdf2tif
parser and can be exploited with a specially crafted input
file. The plugin suffers from a buffer overflow flaw.

Many server side applications use the library when converting
pdf files to images. If an attacker is able to send the
application a malicious file, successful exploitation leads to
code being executed in the context of the running application.

Upgrade to the latest version of the pdf2tif.dll.

April 1th Contacted vendor
April 1th Vendor responded, requesting gold
support license agreement number.
April 8th Vendor released the fix
April 12th Advisory released

http://www.nsense.fi http://www.nsense.dk

$$s$$$$s. ,s$$$$s ,S$$$$$s. $$s$$$$s. ,s$$$$s ,S$$$$$s.
$$$ `$$$ ($$( $$$ `$$$ $$$ `$$$ ($$( $$$ `$$$
$$$ $$$ `^$$s. $$$$$$$$$ $$$ $$$ `^$$s. $$$$$$$$$
$$$ $$$ )$$) $$$ $$$ $$$ )$$) $$$
$$$ $$$ ^$$$$$$7 `7$$$$$P $$$ $$$ ^$$$$$$7 `7$$$$$P

D r i v e n b y t h e c h a l l e n g e _

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus