CVE-2002-0030
CVSS4.6
发布时间 :2003-04-02 00:00:00
修订时间 :2008-09-10 15:11:05
NMCOS    

[原文]The digital signature mechanism for the Adobe Acrobat PDF viewer only verifies the PE header of executable code for a plug-in, which can allow attackers to execute arbitrary code in certified mode by making the plug-in appear to be signed by Adobe.


[CNNVD]Adobe Acrobat插件伪造数字签名漏洞(CNNVD-200304-057)

        
        Adobe Acrobat是设计用于建立和操作PDF文件的软件,Adobe Acrobat Reader是广泛使用的PDF查看程序,Acrobat插件是独立的可执行模块,使用Acrobat SDK在Acrobat架构中工作扩展Acrobat的功能。一般动态库都存放在plug_ins目录中,以运行Acrobat的用户权限一样运行,不过有些插件不是在启动的时候就装载,依靠它们是否数字签字。
        由于数字签名机制的检查不够正确充分,攻击者可以利用这个漏洞构建恶意插件代码使Adobe认为其经过认证,当启动时以运行Acrobat的用户权限执行任意命令。
        插件的数字签名当在Acrobat查看器装载的时候提供部分级别的验证,不过用于Adobe Acrobat的数字签名机制判断插件是否合法,仅仅对插件文件(动态库)的PE头进行检查,因此攻击者可以修改带有合法数字签名的插件并仍然受信于Acrobat,导致包含的恶意命令被启动时装载。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:adobe:acrobat_reader:5.0.5Adobe Acrobat Reader 5.0.5
cpe:/a:adobe:acrobat:4.0Adobe Acrobat 4.0
cpe:/a:adobe:acrobat_reader:4.0.5cAdobe Acrobat Reader 4.0.5 c
cpe:/a:adobe:acrobat_reader:4.0.5aAdobe Acrobat Reader 4.0.5 a
cpe:/a:adobe:acrobat_reader:5.0Adobe Acrobat Reader 5.0
cpe:/a:adobe:acrobat:5.0.5Adobe Acrobat 5.0.5
cpe:/a:adobe:acrobat_reader:4.0Adobe Acrobat Reader 4.0
cpe:/a:adobe:acrobat:5.0Adobe Acrobat 5.0
cpe:/a:adobe:acrobat:4.0.5Adobe Acrobat 4.0.5
cpe:/a:adobe:acrobat:4.0.5cAdobe Acrobat 4.0.5c
cpe:/a:adobe:acrobat:4.0.5aAdobe Acrobat 4.0.5a
cpe:/a:adobe:acrobat_reader:4.0.5Adobe Acrobat Reader 4.0.5

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0030
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0030
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200304-057
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/549913
(VENDOR_ADVISORY)  CERT-VN  VU#549913
http://www.kb.cert.org/vuls/id/JSHA-5EZQGZ
(VENDOR_ADVISORY)  CONFIRM  http://www.kb.cert.org/vuls/id/JSHA-5EZQGZ
http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004230.html
(UNKNOWN)  FULLDISC  20030324 Vulnerability (critical): Digital signature for Adobe Acrobat/Reader plug-in can be forged
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0148.html
(VENDOR_ADVISORY)  VULNWATCH  20030324 Vulnerability (critical): Digital signature for Adobe Acrobat/Reader plug-in can be forged

- 漏洞信息

Adobe Acrobat插件伪造数字签名漏洞
中危 其他
2003-04-02 00:00:00 2005-10-20 00:00:00
本地  
        
        Adobe Acrobat是设计用于建立和操作PDF文件的软件,Adobe Acrobat Reader是广泛使用的PDF查看程序,Acrobat插件是独立的可执行模块,使用Acrobat SDK在Acrobat架构中工作扩展Acrobat的功能。一般动态库都存放在plug_ins目录中,以运行Acrobat的用户权限一样运行,不过有些插件不是在启动的时候就装载,依靠它们是否数字签字。
        由于数字签名机制的检查不够正确充分,攻击者可以利用这个漏洞构建恶意插件代码使Adobe认为其经过认证,当启动时以运行Acrobat的用户权限执行任意命令。
        插件的数字签名当在Acrobat查看器装载的时候提供部分级别的验证,不过用于Adobe Acrobat的数字签名机制判断插件是否合法,仅仅对插件文件(动态库)的PE头进行检查,因此攻击者可以修改带有合法数字签名的插件并仍然受信于Acrobat,导致包含的恶意命令被启动时装载。
        

- 公告与补丁

        厂商补丁:
        Adobe
        -----
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.adobe.com

- 漏洞信息

9294
Adobe Acrobat CTIsCertifiedMode Function Untrusted Plugin Loading
Local Access Required Input Manipulation
Loss of Integrity Solution Unknown
Exploit Unknown

- 漏洞描述

Acrobat contains a flaw that may allow a malicious user to load unauthorized plugins. The issue is triggered by the digital signature verification code, which only validates the header of a plugin file. It is possible that the flaw may allow an attacker to submit a modified plugin which will be executed as "reader-enabled" resulting in a loss of integrity.

- 时间线

2003-03-21 Unknow
2001-07-16 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Adobe Acrobat Plug-In Forged Digital Signature Vulnerability
Origin Validation Error 7174
No Yes
2003-03-24 12:00:00 2009-07-11 09:06:00
Discovery is credited to Dmitry Sklyarov.

- 受影响的程序版本

Adobe Reader 5.0.5
Adobe Reader 5.0
Adobe Reader 4.0.5 A
Adobe Reader 4.0 5c
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
Adobe Reader 4.0 5
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows NT 4.0
Adobe Reader 4.0
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
Adobe Acrobat 5.0.5
Adobe Acrobat 5.0
Adobe Acrobat 4.0.5 A
Adobe Acrobat 4.0 5c
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
Adobe Acrobat 4.0 5
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
Adobe Acrobat 4.0
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows NT 4.0
Adobe Reader 6.0
Adobe Acrobat 6.0

- 不受影响的程序版本

Adobe Reader 6.0
Adobe Acrobat 6.0

- 漏洞讨论

Adobe Acrobat fails to check the validity of a plug-in beyond the portable executable headers. This could allow a plug-in with a valid digital signature to be modified and still seen as trusted by Acrobat. Additionally, a trusted plug-in could be modified to load another, untrusted plug-in and pass control to it.

** Reports indicate that a virus exists that exploits this vulnerability in order to propagate.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Adobe has addressed the issue of malicious plug-ins being loaded in Certified mode in Acrobat/Acrobat Reader 6 releases. Users are advised to upgrade to these versions.

Adobe has released a fix to address this issue:


Adobe Acrobat 5.0.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站