1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Adobe Photoshop BMP File BO

HTTP Adobe Photoshop BMP File BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

Adobe Photoshop is prone to a buffer-overflow vulnerability because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.

An attacker could exploit this issue by enticing a victim to load a malicious file. If successful, the attacker can execute arbitrary code in the context of the affected application.

This issue affects Photoshop CS2 and CS3.

Additional Information

Adobe Photoshop is an application that allows users to view and edit various graphic formats.

The application is prone to a buffer-overflow vulnerability because it fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer. Specifically, the application fails to handle specially crafted BMP, DIB, or RLE files.

An attacker could exploit this issue by enticing a victim to load a malicious file. If successful, the attacker can execute arbitrary code in the context of the affected application.

This issue affects Photoshop CS2 and CS3.

Affected

  • Adobe Photoshop CS2

Response

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:vuldb@securityfocus.com.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube