Common Vulnerabilities and Exposures
CVE-2009-4324 Use-after-free vulnerability in the Doc.media.newPlayer method in Multimedia.api in Adobe Reader and Acrobat 9.x before 9.3, and 8.x before 8.2 on Windows and Mac OS X, allows remote attackers to execute arbitrary code via a crafted PDF file using ZLib compressed streams, as exploited in the wild in December 2009.
General File Information
File ATT29632.pdf
MD5 bd4d584dffedcdeb0efc0b362ff73db8
SHA1 7d018cab3201ec8810bf2a438cbfbe42caa458eFile size 278987 bytes
Type: PDF
Distribution: Email attachment
Download
From: China-US Relations Research Center of Tsinghua University [mailto: ythtzxd@gmail.com]
Sent: Friday, October 29, 2010 12:33 AM
To: XXXX
Subject: Bulletin No. 32 Sino-US relations
Dear Sirs:
Annex Research Center of Tsinghua University China-US relations recently produced the "Sino-US relations presentation" (第三十二期), on October 1 to 15 this important event in Sino-US relations half a summary and analysis for you scholars reference.
Current Editor: Zhang Xudong Zhang Weiyu
Research Center of Tsinghua University, China-US relations
Email: ythtzxd@gmail.com
====
From: 清華大學中美關係研究中心 [mailto:ythtzxd@gmail.com]
Sent: Friday, October 29, 2010 12:33 AM
To: XXXXX
Subject: 中美關係簡報第32期
Sent: Friday, October 29, 2010 12:33 AM
To: XXXX
Subject: Bulletin No. 32 Sino-US relations
Dear Sirs:
Annex Research Center of Tsinghua University China-US relations recently produced the "Sino-US relations presentation" (第三十二期), on October 1 to 15 this important event in Sino-US relations half a summary and analysis for you scholars reference.
Current Editor: Zhang Xudong Zhang Weiyu
Research Center of Tsinghua University, China-US relations
Email: ythtzxd@gmail.com
====
From: 清華大學中美關係研究中心 [mailto:ythtzxd@gmail.com]
Sent: Friday, October 29, 2010 12:33 AM
To: XXXXX
Subject: 中美關係簡報第32期
敬啟者:
附件內為清華大學中美關係研究中心近期制作的《中美關係簡報》(第三十二期),對10月1日至15日這半個月的中美關係重要事件進行了總結和分析,供各位學者參考。
本期編輯:張旭東 張偉玉
清華大學中美關係研究中心
Email: ythtzxd@gmail.com
附件內為清華大學中美關係研究中心近期制作的《中美關係簡報》(第三十二期),對10月1日至15日這半個月的中美關係重要事件進行了總結和分析,供各位學者參考。
本期編輯:張旭東 張偉玉
清華大學中美關係研究中心
Email: ythtzxd@gmail.com
Message Headers
Gmail.
Received: (qmail 4602 invoked from network); 29 Oct 2010 04:32:53 -0000
Received: from msr13.hinet.net (HELO msr13.hinet.net) (168.95.4.113)
by XXXX with SMTP; 29 Oct 2010 04:32:53 -0000
Received: from ythtzxdpc (211-21-218-116.HINET-IP.hinet.net [211.21.218.116])
by msr13.hinet.net (8.9.3/8.9.3) with ESMTP id MAA14299
for XXXXXXXXXXXXXXX; Fri, 29 Oct 2010 12:32:27 +0800 (CST)
Reply-To: ythtzxd@gmail.com
From: "=?BIG5?B?sk212KRqvsekpKz8w/arWazjqHOkpKTf?="
To: XXXX
Subject: =?BIG5?B?pKSs/MP2q1nCsrP4ssQzMrTB?=Received: from msr13.hinet.net (HELO msr13.hinet.net) (168.95.4.113)
by XXXX with SMTP; 29 Oct 2010 04:32:53 -0000
Received: from ythtzxdpc (211-21-218-116.HINET-IP.hinet.net [211.21.218.116])
by msr13.hinet.net (8.9.3/8.9.3) with ESMTP id MAA14299
for XXXXXXXXXXXXXXX; Fri, 29 Oct 2010 12:32:27 +0800 (CST)
Reply-To: ythtzxd@gmail.com
From: "=?BIG5?B?sk212KRqvsekpKz8w/arWazjqHOkpKTf?="
To: XXXX
Date: Thu, 28 Oct 2010 22:33:04 -0600
Message-ID:
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="----=_NextPart_10102822052164073505182_000"
X-Priority: 3
X-Mailer: DreamMail 4.6.8.2
Sender
ythtzxd@gmail.com211.21.218.116
Hostname: 211-21-218-116.hinet-ip.hinet.net
ISP: CHTD, Chunghwa Telecom Co., Ltd.
Organization: Ju Nan Business Co., Ltd.
Country: Taiwan
City: Tainan
ISP: CHTD, Chunghwa Telecom Co., Ltd.
Organization: Ju Nan Business Co., Ltd.
Country: Taiwan
City: Tainan
Automated Scans
File name:ATT29632.pdfhttp://www.virustotal.com/file-scan/report.html?id=cd6dd8239397e392a68f3afd7883a4cf967231292a5bf6fba68f56944291b6d6-1289189777
Submission date:2010-11-08 04:16:17 (UTC)
Result:12/ 35 (34.3%)
AntiVir 7.10.13.164 2010.11.07 EXP/Pidief.Pdfka.39
Avast 4.8.1351.0 2010.11.07 JS:Pdfka-AQP
Avast5 5.0.594.0 2010.11.07 JS:Pdfka-AQP
BitDefender 7.2 2010.11.08 Trojan.Script.471966
ClamAV 0.96.2.0-git 2010.11.08 Exploit.PDF.Gen
Kaspersky 7.0.0.125 2010.11.08 Exploit.JS.Pdfka.cxo
McAfee-GW-Edition 2010.1C 2010.11.07 Heuristic.BehavesLike.JS.BufferOverflow.A
Microsoft 1.6301 2010.11.07 Exploit:Win32/Pdfdrop.A
nProtect 2010-11-08.01 2010.11.08 Trojan.Script.471966
Panda 10.0.2.7 2010.11.07 Exploit/PDF.Gen.B
Sophos 4.59.0 2010.11.08 Troj/PDFJs-FM
Sunbelt 7248 2010.11.08 Exploit.PDF-JS.Gen (v)
MD5 : bd4d584dffedcdeb0efc0b362ff73db8
ViCheck.ca
https://www.vicheck.ca/md5query.php?hash=bd4d584dffedcdeb0efc0b362ff73db8
Result: PDF Javascript heap spray shellcode
Wepawet
http://wepawet.iseclab.org/view.php?hash=bd4d584dffedcdeb0efc0b362ff73db8&type=js
No comments:
Post a Comment