search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Adobe Download Manager buffer overflow

Vulnerability Note VU#448569

Original Release Date: 2006-12-07 | Last Revised: 2006-12-07

Overview

Adobe Download Manager contains a buffer overflow. This vulnerability may allow a remote, unauthenticated attacker to run arbitrary code with the privileges of the affected user or cause a denial-of-service condition.

Description

Adobe Download Manager (ADM)

ADM is a utility that Adobe provides to aid in downloading Adobe software. ADM is included with the download of numerous Adobe products including, but not limited to, Adobe Reader. More information on ADM is available at the About Download Manager website.

AOM files

AOM files contain download instructions to be executed by ADM. When an AOM file is parsed, the download instructions in that AOM file are stored in %APPDATA%\dm.ini for further processing by ADM. Note that a file association is created between ADM and AOM files (.aom) when ADM is installed. As a result, accessing an AOM file launches ADM by default.

The Problem

ADM fails to properly handle malformed download instructions allowing a stack-based buffer overflow to occur. If a remote attacker can persuade a user to access a specially crafted AOM file with ADM, that attacker may be able to trigger the buffer overflow.

Note that in some instances ADM is automatically removed when the installation of requested Adobe software is completed. To determine if ADM is installed follow the instructions in Adobe Security bulletin APSB06-19.

Impact

A remote unauthenticated attacker may be able to execute arbitrary code by convincing a user to open a specially crafted AOM file. This can be achieved by creating a specially crafted web page or other HTML document that may launch ADM without any user interaction.

Solution

Uninstall Adobe Download Manager
To uninstall ADM follow the instructions in Adobe Security bulletin APSB06-19.

Adobe has also addressed this issue in Adobe Download Manager version 2.2.


Disable file association for AOM files

Disable the file association for AOM files to help prevent windows applications from using Adobe Download Manager to open AOM files. This can be accomplished by deleting the following registry key:

HKEY_CLASSES_ROOT\aom
Do not access AOM files from untrusted sources

Attackers may host malicious AOM files on web sites. In order to convince users to visit their sites, those attackers often use a variety of techniques to create misleading links including URL encoding, IP address variations, long URLs, and intentional misspellings. Do not click on unsolicited links received in email, instant messages, web forums, or internet relay chat (IRC) channels. Type URLs directly into the browser to avoid these misleading links. While these are generally good security practices, following these behaviors will not prevent exploitation of this vulnerability in all cases, particularly if a trusted site has been compromised or allows cross-site scripting.

Vendor Information

448569
 
Affected   Unknown   Unaffected

Adobe

Updated:  December 07, 2006

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Refer to Adobe Security bulletin APSB06-19.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

This issue was reported in Adobe Security bulletin APSB06-19 . Adobe credits Zero Day Initiative and eEye Digital Security for reporting this vulnerability.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2006-5856
Severity Metric: 4.62
Date Public: 2006-12-06
Date First Published: 2006-12-07
Date Last Updated: 2006-12-07 14:08 UTC
Document Revision: 26

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.