Adobe Photoshop 13.0 PNG Image MultiPlugin.8BF memory corruption

| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.0 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Adobe Photoshop 13.0 and classified as critical. Affected by this issue is some unknown functionality of the file MultiPlugin.8BF of the component PNG Image Handler. Performing a manipulation results in memory corruption. This vulnerability is identified as CVE-2012-4170. Additionally, an exploit exists. The affected component should be upgraded.
Details
A vulnerability, which was classified as critical, was found in Adobe Photoshop 13.0 (Image Processing Software). This affects an unknown part of the file MultiPlugin.8BF of the component PNG Image Handler. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Buffer overflow in Adobe Photoshop CS6 13.x before 13.0.1 allows remote attackers to execute arbitrary code via a crafted file.
The weakness was released 08/30/2012 by Francis Provencher as confirmed advisory (Website) via Secunia. It is possible to read the advisory at adobe.com. The public release was coordinated with Adobe. This vulnerability is uniquely identified as CVE-2012-4170 since 08/07/2012. The exploitability is told to be difficult. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details and a public exploit are known.
The exploit is shared for download at exploit-db.com. It is declared as proof-of-concept. We expect the 0-day to have been worth approximately $5k-$25k. The vulnerability scanner Nessus provides a plugin with the ID 803025 , which helps to determine the existence of the flaw in a target environment. The commercial vulnerability scanner Qualys is able to test this issue with plugin 120454 (Adobe Photoshop PNG Image Processing Buffer Overflow Vulnerability (APSB12-20)).
Upgrading to version CS6 13.0.1 eliminates this vulnerability. The upgrade is hosted for download at blogs.adobe.com. A possible mitigation has been published immediately after the disclosure of the vulnerability. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 26630.
The vulnerability is also documented in the databases at X-Force (78184), Exploit-DB (20971), Tenable (803025), SecurityFocus (BID 55333†) and OSVDB (85006†). Entry connected to this vulnerability is available at VDB-6302. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.adobe.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 10.0VulDB Meta Temp Score: 9.0
VulDB Base Score: 10.0
VulDB Temp Score: 9.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 803025
Nessus File: 🔍
Nessus Risk: 🔍
OpenVAS ID: 803026
OpenVAS Name: Adobe Photoshop PNG Image Processing Buffer Overflow Vulnerabilities (Mac OS X)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Photoshop CS6 13.0.1
TippingPoint: 🔍
Fortigate IPS: 🔍
Timeline
08/07/2012 🔍08/30/2012 🔍
08/30/2012 🔍
08/30/2012 🔍
08/31/2012 🔍
08/31/2012 🔍
08/31/2012 🔍
08/31/2012 🔍
08/31/2012 🔍
09/03/2012 🔍
09/04/2012 🔍
09/11/2012 🔍
07/02/2025 🔍
Sources
Vendor: adobe.comAdvisory: adobe.com
Researcher: Francis Provencher
Status: Confirmed
Confirmation: 🔍
Coordinated: 🔍
CVE: CVE-2012-4170 (🔍)
GCVE (CVE): GCVE-0-2012-4170
GCVE (VulDB): GCVE-100-6051
OVAL: 🔍
IAVM: 🔍
X-Force: 78184
SecurityFocus: 55333 - Adobe Photoshop CVE-2012-4170 Remote Buffer Overflow Vulnerability
Secunia: 49141 - Adobe Photoshop Image Processing Buffer Overflow Vulnerabilities, Highly Critical
OSVDB: 85006
SecurityTracker: 1027477 - Adobe Photoshop Buffer Overflows Let Remote Users Execute Arbitrary Code
Vulnerability Center: 36103 - [APSB12-20] Adobe Photoshop CS6 13.x Before 13.0.1 Remote Buffer Overflow Vulnerability via a Crafted File, Critical
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 08/31/2012 17:29Updated: 07/02/2025 10:06
Changes: 08/31/2012 17:29 (85), 04/16/2017 11:45 (15), 07/02/2025 10:06 (18)
Complete: 🔍
Committer: olku
Cache ID: 216::103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.