Adobe Reader CoolType Out-Of-Bounds Read
Adobe Reader的CoolType.dll字体库中Type1/CFF字符串解释器代码未检查输入流指针是否超出源缓冲区边界,在三种情况下可能发生无界读取:执行循环开始时读取主操作码、读取'escape'指令的第二个字节以及读取'extendedmbr'参数或数值。这可能导致解析器读取垃圾数据或超出内存页导致AcroRd32.exe崩溃。该漏洞影响Adobe Reader 11.0.10及更早版本,但因严重性较低未开发PoC证明概念。 2025-2-28 17:2:0 Author: cxsecurity.com(查看原文) 阅读量:4 收藏

Adobe Reader CoolType Out-Of-Bounds Read

The Type1/CFF CharString interpreter code in the Adobe Reader CoolType.dll font library does not check if the input stream pointer has not gone beyond the end of the source buffer, which stores the state machine instructions. The unbounded reads can happen: 1) At the beginning of the VM execution loop (reading main opcode). 2) While reading the second opcode byte in case of the 'escape' instruction. 3) While reading the 'extendedmbr' instruction parameter, or the 16/32-bit numeric value to be pushed onto the interpreter stack. This may result in the following outcomes: 1) The parser reads garbage, uninitialized or left-over data and interprets them as CharString instructions. 2) The parser reaches the end of a mapped memory page and attempts to read bytes beyond it, consequently resulting in a crash of the sandboxed AcroRd32.exe process. Neither scenario is a serious security threat (contrary to an equivalent bug filed on Windows Kernel ATMFD.DLL, which can lead to global system crash or information disclosure), so this bug is filed just as a general note on the code quality of the CharString interpreter in CoolType. Adobe Reader 11.0.10 is confirmed to be affected, but we expect all prior versions of the software to be prone to the bug, too. Due to minimal severity of the issue, we have not developed a proof of concept. This bug is subject to a 90 day disclosure deadline. If 90 days elapse without a broadly available patch, then the bug report will automatically become visible to the public.



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2025020021
如有侵权请联系:admin#unsafe.sh