9.3
CVSSv2

CVE-2008-2992

Published: 04/11/2008 Updated: 30/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 950
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and previous versions allows remote malicious users to execute arbitrary code via a PDF file that calls the util.printf JavaScript function with a crafted format string argument, a related issue to CVE-2008-1104.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat 7.0.8

adobe acrobat 7.0.7

adobe acrobat 7.0

adobe acrobat 6.0.5

adobe acrobat 6.0.4

adobe acrobat 5.0.10

adobe acrobat 5.0

adobe acrobat reader 7.0.1

adobe acrobat reader 7.0

adobe acrobat reader 7.0.4

adobe acrobat reader 7.0.5

adobe acrobat reader

adobe acrobat reader 6.0.2

adobe acrobat reader 6.0.1

adobe acrobat reader 5.0.11

adobe acrobat reader 5.0.10

adobe acrobat 8.1.1

adobe acrobat 8.1

adobe acrobat 7.0.4

adobe acrobat 7.0.3

adobe acrobat 6.0.1

adobe acrobat 6.0

adobe acrobat 4.0.5

adobe acrobat 4.0

adobe acrobat reader 7.0.8

adobe acrobat reader 7.0.9

adobe acrobat reader 8.0

adobe acrobat

adobe acrobat 7.0.6

adobe acrobat 7.0.5

adobe acrobat 6.0.3

adobe acrobat 6.0.2

adobe acrobat 4.0.5c

adobe acrobat 4.0.5a

adobe acrobat reader 7.0.6

adobe acrobat reader 7.0.7

adobe acrobat reader 8.1.1

adobe acrobat reader 8.1

adobe acrobat reader 6.0

adobe acrobat reader 5.1

adobe acrobat reader 5.0

adobe acrobat reader 4.5

adobe acrobat 8.0

adobe acrobat 7.0.9

adobe acrobat 7.0.2

adobe acrobat 7.0.1

adobe acrobat 5.0.6

adobe acrobat 5.0.5

adobe acrobat 3.1

adobe acrobat 3.0

adobe acrobat reader 7.0.2

adobe acrobat reader 7.0.3

adobe acrobat reader 6.0.4

adobe acrobat reader 6.0.3

adobe acrobat reader 5.0.6

adobe acrobat reader 5.0.5

adobe acrobat reader 4.0.5

adobe acrobat reader 4.0

adobe acrobat reader 3.0

adobe acrobat reader 6.0.5

adobe acrobat reader 5.0.9

adobe acrobat reader 5.0.7

adobe acrobat reader 4.0.5c

adobe acrobat reader 4.0.5a

Vendor Advisories

Synopsis Critical: acroread security update Type/Severity Security Advisory: Critical Topic Updated acroread packages that fix various security issues are nowavailable for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4Extras, and Red Hat Enterprise Linux 5 SupplementaryThis update has been r ...

Exploits

Adobe Reader Javascript printf buffer overflow exploit that binds a shell to port 4444 ...
Adobe Reader Javascript Printf Buffer Overflow Exploit =========================================================== Reference: wwwcoresecuritycom/content/adobe-reader-buffer-overflow CVE-2008-2992 Thanks to coresecurity for the technical background 6Nov,2008: Exploit released by me Credits: Debasis Mohanty wwwhackingspiritscom wwwc ...
## # $Id: adobe_utilprintfrb 10477 2010-09-25 11:59:02Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' require ...
Adobe Reader 'utilprintf()' JavaScript Function Stack Buffer Overflow Exploit author: Elazar githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/6994pdf (2008-APSB08-19pdf) # milw0rmcom [2008-11-05] ...
## # $Id: adobe_utilprintfrb 9212 2010-05-03 17:13:09Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' requir ...

Recent Articles

Japan Quake Spam leads to Malware Part 3
Securelist • Nicolas Brulez • 21 Mar 2011

Last week, we published a blog post regarding the ongoing spam campaign using the recent earthquake in Japan to infect users. This is a follow up blog describing the exploits used. According to our analysis, it seems that the malicious links from the spam emails lead to websites hosting the Incognito Exploit Kit. Here is an interesting picture from the servers hosting the exploit kit: You can see below another example from the spam campaign, this time pretending to be an email from Twitter: The ...

End of the Line for the Bredolab Botnet?
Securelist • Alexei Kadiev • 20 Dec 2010

On 25 October 2010, the Dutch police force’s Cybercrime Department announced the shutdown of 143 Bredolab botnet control servers. The next day at Armenia’s Yerevan international airport, one of those formerly responsible for running the botnet was arrested. While it is certainly possible that this marked the end of Bredolab, the technologies behind it remain and can, unfortunately, still be used to create new botnets. Malicious programs from the Backdoor.Win32.Bredolab family were first dete...

Monthly Malware Statistics: October 2009
Securelist • Eugene Aseev • 05 Nov 2009

Kaspersky Lab presents its monthly malware statistics for October. From this month onwards, the data used is gathered from all products which use the Kaspersky Security Network (KSN), i.e. products from both the 2009 and 2010 lines. As a result, the Top Twenties have changed somewhat, and the figures in both ratings this month are significantly higher, due to an increased numbers of users participating in KSN. The first Top Twenty lists malicious programs, adware and potentially unwanted program...

Miscreants hijacking machines via (freshly patched) Adobe flaw
The Register • Dan Goodin • 07 Nov 2008

Is yours next?

If you haven't updated your Adobe Reader program lately, now would be a good time. Three days after the company rushed out a critical update, miscreants are actively exploiting a security flaw to execute malicious code on vulnerable machines. The SANS Internet Storm Center says here that researchers have spotted laced PDF files being circulated online. Its discovery comes on the heels of the public release of proof-of-concept code exploiting CVE-2008-2992. According to SANS, none of the 32 top a...