Adobe Reader 11.0.4 Crafted PDF File Handling JavaScript Scheme URI Execution (APSB13-25)

high Nessus Plugin ID 70343

Synopsis

The version of Adobe Reader on the remote Windows host is affected by a JavaScript URI scheme execution vulnerability.

Description

The version of Adobe Reader installed on the remote host is 11.0.4. It is, therefore, affected by a flaw in the handling of specially crafted PDF files. This could allow an attacker to launch JavaScript URI schemes.

Solution

Upgrade to Adobe Reader 11.0.5 or later.

See Also

https://www.adobe.com/support/security/bulletins/apsb13-25.html

Plugin Details

Severity: High

ID: 70343

File Name: adobe_reader_apsb13-25.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 10/9/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:adobe:acrobat_reader

Required KB Items: SMB/Acroread/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 10/8/2013

Vulnerability Publication Date: 10/8/2013

Reference Information

CVE: CVE-2013-5325

BID: 62888