How to Buy
This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
An updated Adobe Acrobat Reader package that fixes multiple security
issues is now available.
The Adobe Acrobat Reader browser allows for the viewing, distributing,
and printing of documents in portable document format (PDF).
iDEFENSE has reported that Adobe Acrobat Reader 5.0 contains a buffer
overflow when decoding uuencoded documents. An attacker could execute
arbitrary code on a victim's machine if a user opens a specially
crafted uuencoded document. This issue poses the threat of remote
execution, since Acrobat Reader may be the default handler for PDF
files. The Common Vulnerabilities and Exposures project has assigned
the name CVE-2004-0631 to this issue.
iDEFENSE also reported that Adobe Acrobat Reader 5.0 contains an input
validation error in its uuencoding feature. An attacker could create a
file with a specially crafted file name which could lead to arbitrary
command execution on a victim's machine. The Common Vulnerabilities
and Exposures project has assigned the name CVE-2004-0630 to this
All users of Acrobat Reader are advised to upgrade to this updated
package, which is not vulnerable to these issues.
See also :
Update the affected acroread and / or acroread-plugin packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Red Hat Local Security Checks
Nessus Plugin ID: 14380 ()
CVE ID: CVE-2004-0630CVE-2004-0631
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.