How to Buy
This script is Copyright (C) 2008-2017 Tenable Network Security, Inc.
The PDF file viewer on the remote Windows host is affected by multiple
The version of Adobe Reader installed on the remote host is earlier
than 8.1.2 or 7.1.0. Such versions are reportedly affected by multiple
- A design error vulnerability may allow an attacker to
gain control of a user's printer.
- Multiple stack-based buffer overflows may allow an
attacker to execute arbitrary code subject to the
- Insecure loading of 'Security Provider' libraries may
allow for arbitrary code execution.
in the 'EScript.api' plug-in allows direct control
over low-level features of the object, which allows
for execution of arbitrary code as the current user.
- Two vulnerabilities in the unpublicized function
'app.checkForUpdate()' exploited through a callback
function could lead to arbitrary code execution in
Adobe Reader 7.
See also :
Upgrade to Adobe Reader 8.1.2 / 7.1.0 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Nessus Plugin ID: 30200 (adobe_reader_812.nasl)
Bugtraq ID: 27641
CVE ID: CVE-2007-5659CVE-2007-5663CVE-2007-5666CVE-2008-0655CVE-2008-0667CVE-2008-0726CVE-2008-2042
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.