{"vuid":"VU#184820","idnumber":"184820","name":"Adobe Acrobat does not adequately validate Acrobat JavaScript","keywords":["Adobe","Acrobat","JavaScript parsing engine","PDF","plug-ins folder","death.api","evil.fdf","yourde","ECMAScript"],"overview":"Adobe Acrobat contains a vulnerability in its JavaScript parsing engine that could allow an attacker to place arbitrary files on the local file system.","clean_desc":"Different versions of Adobe Acrobat software can create, modify, and read Portable Document Format (PDF) files. Acrobat JavaScript implements PDF-specific objects, methods, and properties and provides functionality similar to that of HTML client JavaScript. More information about Acrobat JavaScript is available from Acrobat 5 JavaScript Training site and in the Acrobat JavaScript Object Specification. A vulnerability in the way Acrobat 5 validates JavaScript in PDF files could allow arbitrary files to be written to any location on the local file system that is writeable by the user running Acrobat. From the Adobe Acrobat 5.0.5 Security, Accessibility, and Forms patch: Due to a vulnerability in the JavaScript parsing engine, a malicious PDF document can instruct Acrobat to write code into the user's Plug-ins folder. Any file in the user's Plug-ins folder that is developed to the Acrobat plug-in specification will automatically install and run when a user launches Acrobat. According to Adobe, the full version of Acrobat 5 and Acrobat Approval 5 for the Windows platform are vulnerable. Acrobat 6 and all versions of Acrobat Reader are not vulnerable. Acrobat and Acrobat Approval for Macintosh and Acrobat for UNIX are not vulnerable.","impact":"An attacker could cause arbitrary files to be written to the local file system within the scope of the users' permissions. A virus (W32.Yourde) that exploits this vulnerability has been discovered. This virus does not destroy data. More detailed information is available in write-ups from Symantec and McAfee.","resolution":"Apply Patch or Upgrade Install the Adobe Acrobat 5.0.5 Security, Accessibility, and Forms patch or upgrade to Acrobat 6 or later.","workarounds":"Disable JavaScript Acrobat JavaScript can be disabled in the General preferences dialog (Edit > Preferences > General > JavaScript). Restrict Access to Plug-ins Directory Use NTFS file permissions to prevent users from writing to the Plug-ins directory (typically C:\\Program Files\\Adobe\\Acrobat 5.0\\Acrobat\\Plug_ins). This will protect against the W32.Yourde virus, but it will not prevent malicious JavaScript from writing to other locations. Remove JavaScript Plug-in Remove the JavaScript plug-in (EScript.api) from the Plug-ins directory. This will effectively disable Acrobat JavaScript and may cause other unexpected results. Maintain Anti-Virus Software As a general best practice, maintain updated anti-virus software. Links to anti-virus vendors and other information are available on the Computer Virus Resources page.","sysaffected":"","thanks":"This vulnerability was reported by John Landwehr of  Adobe Systems Inc.","author":"This document was written by Art Manion.","public":["http://www.adobe.com/support/downloads/detail.jsp?ftpID=2121","http://securityresponse.symantec.com/avcenter/venc/data/w32.yourde.html","http://vil.nai.com/vil/content/v_100269.htm","http://partners.adobe.com/asn/developer/training/acrobat/javascript/main.html","http://partners.adobe.com/asn/acrobat/docs.jsp","http://partners.adobe.com/asn/developer/pdfs/tn/5186AcroJS.pdf"],"cveids":["CVE-2003-0284"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-05-01T15:19:39Z","publicdate":"2003-04-30T00:00:00Z","datefirstpublished":"2003-05-13T17:53:57Z","dateupdated":"2003-07-10T20:44:07Z","revision":35,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"4","cam_internetinfrastructure":"4","cam_population":"7","cam_impact":"11","cam_easeofexploitation":"7","cam_attackeraccessrequired":"20","cam_scorecurrent":"4.648875","cam_scorecurrentwidelyknown":"5.6595","cam_scorecurrentwidelyknownexploited":"8.8935","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":4.648875,"vulnote":null}