BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

CoolPDF Reader Buffer Overflow

Disclosed January 18, 2013    Zeroday : 586 days

Vulnerability Description:

CoolPDF Reader contains a vulnerability caused by a boundary error when processing a stream within a PDF. This error causes a stack-based buffer overflow which can be leveraged to remotely execute code within the context of the currently logged on user.

Vendors:

CoolPDF Software, Inc

Vulnerable Software/Devices:

CoolPDF Reader 3.0.2.256 and possibly earlier versions

Vulnerability Severity:

High

Exploit Availability:

Publicly Available

Exploit Impact:

Remote Code Execution
Exploitation of this vulnerability is possible via maliciously crafted PDF documents. Attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 18065 - Cool PDF Reader Buffer Overflow (Zero-Day)

Mitigation:

Do not open untrusted PDF documents, or PDF documents that come from trusted sources unexpectedly, with CoolPDF.

Links:

CVE(s):