How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The version of Adobe Reader on the remote Mac OS X host is affected by
The version of Adobe Reader installed on the remote Mac OS X host is
prior to 10.1.3 or 9.5.1. It is, therefore, affected by the following
- An integer overflow condition exists that allows an
attacker to execute arbitrary code via a crafted True
Type Font (TFF). (CVE-2012-0774)
that allows an attacker to execute arbitrary code.
- A security bypass vulnerability exists in the Adobe
Reader installer that allows an attacker to execute
arbitrary code. (CVE-2012-0776)
that allows an attacker to execute arbitrary code or
cause a denial of service. (CVE-2012-0777)
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
See also :
Upgrade to Adobe Reader version 10.1.3 / 9.5.1 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true
Family: MacOS X Local Security Checks
Nessus Plugin ID: 58684 ()
Bugtraq ID: 52032520335203452035520365203752040522975229952748529145291652949529505295152952
CVE ID: CVE-2012-0724CVE-2012-0725CVE-2012-0751CVE-2012-0752CVE-2012-0753CVE-2012-0754CVE-2012-0755CVE-2012-0756CVE-2012-0767CVE-2012-0768CVE-2012-0769CVE-2012-0772CVE-2012-0773CVE-2012-0774CVE-2012-0775CVE-2012-0776CVE-2012-0777
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.