RULE(RULE ID:714789)

Rule General Information
Release Date: 2024-11-28
Rule Name: Adobe Reader U3D CLODMeshDeclaration 'Shading Count' Field Buffer Overflow Vulnerability (CVE-2010-0196)
Severity:
CVE ID:
Rule Protection Details
Description: Adobe Acrobat Reader is a free software widely used to view and print PDF files. Adobe Acrobat Reader 9.x (version before 9.3.2) and 8.x (version before 8.2.2) have buffer overflow vulnerabilities. The vulnerability is caused by a buffer overflow vulnerability caused by an integer overflow when Adobe Acrobat Reader processes the "Shading Count" field in the CLODMeshDeclaration block of U3D files. A remote attacker could exploit this vulnerability to trick a user into opening a maliciously crafted PDF document to execute arbitrary code on a victim's system.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows, Linux, Others
Reference: AdobeSecurityBulletins:apsb10-09
SecurityFocusBID:39329
http://www.us-cert.gov/cas/techalerts/TA10-103C.html
http://www.vupen.com/english/advisories/2010/0873
Solutions
The vendor has released upgrade patches to fix vulnerabilities, please visit:
http://www.adobe.com/support/security/bulletins/apsb10-09.html