To successfully exploit this vulnerability, special conditions are needed: for example, in order for unauthorized execution of arbitrary code to take place, you must close or restart the Internet browser. Another way to exploit the vulnerability is to initiate an interactive user interaction, according to which the victim will need to confirm some action in the context of the open document, after which the malicious code will be executed
One of the significant features is the fact that not a single exploit was previously advertised for the specified version of Adobe Reader due to the presence of the built-in sandbox (Sandbox, Protected View - blogs.adobe.com/asset/2010/10/inside-adobe- reader-protected-mode-part-1-design.html ), which limits the ability to execute arbitrary code through internal instructions and a special runtime environment.
The cost of such vulnerabilities in the cybercrime market varies from 30,000 to 50,000 dollars
Source: https://habr.com/ru/post/158045/
All Articles