Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader's current working directory. NOTE: this issue might be subsumed by CVE-2008-0655.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.us-cert.gov/cas/techalerts/TA08-043A.html | third party advisory us government resource |
http://www.adobe.com/support/security/bulletins/apsb08-13.html | |
http://www.vupen.com/english/advisories/2008/1966/references | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161 | vdb entry signature |
http://www.adobe.com/support/security/advisories/apsa08-01.html | patch |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1 | vendor advisory |
http://security.gentoo.org/glsa/glsa-200803-01.xml | vendor advisory |
http://secunia.com/advisories/29065 | third party advisory vendor advisory |
http://secunia.com/advisories/30840 | third party advisory |
http://secunia.com/advisories/29205 | third party advisory |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655 | third party advisory |
http://www.redhat.com/support/errata/RHSA-2008-0144.html | vendor advisory |