Vulnerabilities > CVE-2015-3112 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Adobe Bridge and Photoshop CC

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
adobe
apple
microsoft
CWE-119
critical
nessus
exploit available

Summary

Adobe Photoshop CC before 16.0 (aka 2015.0.0) and Adobe Bridge CC before 6.11 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Exploit-Db

descriptionPhotoshop CC2014 and Bridge CC 2014 PDF Parsing Memory Corruption Vulnerabilities. CVE-2015-3112. Dos exploit for windows platform
idEDB-ID:37349
last seen2016-02-04
modified2015-06-23
published2015-06-23
reporterFrancis Provencher
sourcehttps://www.exploit-db.com/download/37349/
titlePhotoshop CC2014 and Bridge CC 2014 PDF Parsing Memory Corruption Vulnerabilities

Nessus

  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_ADOBE_PHOTOSHOP_APSB15-12.NASL
    descriptionThe version of Adobe Photoshop installed on the remote Mac OS X host is prior or equal to CC 2014 15.2.2 (2014.2.2). It is, therefore, affected by the following vulnerabilities : - An unspecified memory corruption flaw exists due to not properly validating user-supplied input. An attacker can exploit this to execute arbitrary code. (CVE-2015-3109) - A integer overflow flaw exists in the GIF parser due to not properly handling a GIF file with an invalid ImageLeftPosition value. An attacker can exploit this to corrupt memory or execute arbitrary code. (CVE-2015-3110) - A heap-based overflow flaw exists in the PNG parser due to not properly handling a PNG file in which the CHUNK structure has an oversized length value. An attacker can exploit this to corrupt memory or execute arbitrary code. (CVE-2015-3111) - A memory corruption flaw exists due to not properly validating user-supplied input when handling a PDF file containing an embedded JPEG with an oversized field value. An attacker can exploit this to corrupt memory or execute arbitrary code. (CVE-2015-3112)
    last seen2020-06-01
    modified2020-06-02
    plugin id84404
    published2015-06-26
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84404
    titleAdobe Photoshop CC Multiple Vulnerabilities (APSB15-12) (Mac OS X)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(84404);
      script_version("1.9");
      script_cvs_date("Date: 2018/07/14  1:59:36");
    
      script_cve_id(
        "CVE-2015-3109",
        "CVE-2015-3110",
        "CVE-2015-3111",
        "CVE-2015-3112"
      );
      script_bugtraq_id(
        75240,
        75242,
        75243,
        75245
      );
    
      script_name(english:"Adobe Photoshop CC Multiple Vulnerabilities (APSB15-12) (Mac OS X)");
      script_summary(english:"Checks the Photoshop version.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote host has an application that is affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Adobe Photoshop installed on the remote Mac OS X host
    is prior or equal to CC 2014 15.2.2 (2014.2.2). It is, therefore,
    affected by the following vulnerabilities :
    
      - An unspecified memory corruption flaw exists due to not
        properly validating user-supplied input. An attacker can
        exploit this to execute arbitrary code. (CVE-2015-3109)
    
      - A integer overflow flaw exists in the GIF parser due to
        not properly handling a GIF file with an invalid
        ImageLeftPosition value. An attacker can exploit this to
        corrupt memory or execute arbitrary code.
        (CVE-2015-3110)
    
      - A heap-based overflow flaw exists in the PNG parser due
        to not properly handling a PNG file in which the CHUNK
        structure has an oversized length value. An attacker can
        exploit this to corrupt memory or execute arbitrary code.
        (CVE-2015-3111)
    
      - A memory corruption flaw exists due to not properly
        validating user-supplied input when handling a PDF
        file containing an embedded JPEG with an oversized
        field value. An attacker can exploit this to corrupt
        memory or execute arbitrary code. (CVE-2015-3112)");
      script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/photoshop/apsb15-12.html");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Adobe Photoshop CC 2015 16.0 (2015.0.0) or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/06/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/06/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/06/26");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:photoshop");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:photoshop_cc");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
    
      script_dependencies("macosx_adobe_photoshop_installed.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version", "installed_sw/Adobe Photoshop");
    
      exit(0);
    }
    
    include("global_settings.inc");
    include("misc_func.inc");
    include("audit.inc");
    include("install_func.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    
    os = get_kb_item('Host/MacOSX/Version');
    if (!os) audit(AUDIT_OS_NOT, 'Mac OS X');
    
    get_kb_item_or_exit("installed_sw/Adobe Photoshop");
    
    app = 'Adobe Photoshop';
    
    install=get_single_install(app_name:app, exit_if_unknown_ver:TRUE);
    
    product = install['name'];
    if ("CC" >!< product)
      exit(0, "Only Adobe Photoshop CC is affected.");
    
    path    = install['path'];
    version = install['version'];
    
    if (ver_compare(ver:version, fix:'15.2.2', strict:FALSE) <= 0)
    {
      if (report_verbosity > 0)
      {
        report = '\n  Product           : ' + product +
                 '\n  Path              : ' + path +
                 '\n  Installed version : ' + version +
                 '\n  Fixed version     : 16.0';
    
        security_hole(port:0, extra:report);
      }
      else security_hole(0);
    }
    else audit(AUDIT_INST_VER_NOT_VULN, app + " CC", version);
    
  • NASL familyWindows
    NASL idADOBE_PHOTOSHOP_APSB15-12.NASL
    descriptionThe version of Adobe Photoshop installed on the remote host is prior or equal to CC 2014 15.2.2 (2014.2.2). It is, therefore, affected by the following vulnerabilities : - An unspecified memory corruption flaw exists due to not properly validating user-supplied input. An attacker can exploit this to execute arbitrary code. (CVE-2015-3109) - A integer overflow flaw exists in the GIF parser due to not properly handling a GIF file with an invalid ImageLeftPosition value. An attacker can exploit this to corrupt memory or execute arbitrary code. (CVE-2015-3110) - A heap-based overflow flaw exists in the PNG parser due to not properly handling a PNG file in which the CHUNK structure has an oversized length value. An attacker can exploit this to corrupt memory or execute arbitrary code. (CVE-2015-3111) - A memory corruption flaw exists due to not properly validating user-supplied input when handling a PDF file containing an embedded JPEG with an oversized field value. An attacker can exploit this to corrupt memory or execute arbitrary code. (CVE-2015-3112)
    last seen2020-06-01
    modified2020-06-02
    plugin id84403
    published2015-06-26
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84403
    titleAdobe Photoshop CC Multiple Vulnerabilities (APSB15-12)