Vigil@nce - Adobe Reader: unreachable memory reading via CoolType.dll
May 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can force a read at an invalid address in CoolType.dll
of Adobe Reader, in order to trigger a denial of service.
– Impacted products: Acrobat
– Severity: 1/4
– Creation date: 13/05/2015
DESCRIPTION OF THE VULNERABILITY
The Adobe Reader product uses the Type1/CFF CharString interpreter
in CoolType.dl to display fonts.
However, it tries to read an unreachable memory area, which
triggers a fatal error.
An attacker can therefore force a read at an invalid address in
CoolType.dll of Adobe Reader, in order to trigger a denial of
service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Adobe-Reader-unreachable-memory-reading-via-CoolType-dll-16898