module

AdobeCollabSync Buffer Overflow Adobe Reader X Sandbox Bypass

Disclosed
2013-05-14
Created
2018-05-30

Description

This module exploits a vulnerability on Adobe Reader X Sandbox. The
vulnerability is due to a sandbox rule allowing a Low Integrity AcroRd32.exe
process to write register values which can be used to trigger a buffer overflow on
the AdobeCollabSync component, allowing to achieve Medium Integrity Level
privileges from a Low Integrity AcroRd32.exe process. This module has been tested
successfully on Adobe Reader X 10.1.4 over Windows 7 SP1.

Authors

Felipe Andres Manzano
juan vazquez juan.vazquez@metasploit.com

Platform

Windows

Architectures

x86

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/windows/local/adobe_sandbox_adobecollabsync
msf exploit(adobe_sandbox_adobecollabsync) > show targets
...targets...
msf exploit(adobe_sandbox_adobecollabsync) > set TARGET < target-id >
msf exploit(adobe_sandbox_adobecollabsync) > show options
...show and set options...
msf exploit(adobe_sandbox_adobecollabsync) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.