CVE-2006-5856
Adobe Download Manager AOM Parsing Buffer Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the Adobe Download Manager before 2.2 allows remote attackers to execute arbitrary code via a long section name in the dm.ini file, which is populated via an AOM file.
Desbordamiento de búfer basado en pila en el Adobe Download Manager anterior a 2.2 permite a atacantes remotos ejecutar código de su elección mediante un nombre de sección largo en el fichero dm.ini, el cual es rellenado mediante un fichero AOM.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Adobe Download Manager application. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.
The specific flaw exists in the AOM file format parser. A long [URL] element inside of a [DownloadRecord] element within an AOM file will result in a stack-based buffer overflow condition leading to execution of arbitrary code. The Download Manager is installed during the installation of of other Adobe products, such as Acrobat Reader. When installed, the download manager becomes the default application to handle .AOM files.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2006-11-10 CVE Reserved
- 2006-12-06 CVE Published
- 2023-10-10 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2006-December/051114.html | Mailing List | |
http://secunia.com/advisories/23233 | Third Party Advisory | |
http://securitytracker.com/id?1017340 | Vdb Entry | |
http://www.kb.cert.org/vuls/id/448569 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/453636/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/453755/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2006/4867 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-06-044 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30742 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://research.eeye.com/html/advisories/published/AD20061205.html | 2018-10-17 | |
http://www.adobe.com/support/security/bulletins/apsb06-19.html | 2018-10-17 | |
http://www.securityfocus.com/bid/21453 | 2018-10-17 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Adobe Search vendor "Adobe" | Download Manager Search vendor "Adobe" for product "Download Manager" | <= 2.1 Search vendor "Adobe" for product "Download Manager" and version " <= 2.1" | - |
Affected
|