RHEL 3 : acroread (RHSA-2004:432)

This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An updated Adobe Acrobat Reader package that fixes multiple security
issues is now available.

The Adobe Acrobat Reader browser allows for the viewing, distributing,
and printing of documents in portable document format (PDF).

iDEFENSE has reported that Adobe Acrobat Reader 5.0 contains a buffer
overflow when decoding uuencoded documents. An attacker could execute
arbitrary code on a victim's machine if a user opens a specially
crafted uuencoded document. This issue poses the threat of remote
execution, since Acrobat Reader may be the default handler for PDF
files. The Common Vulnerabilities and Exposures project has assigned
the name CVE-2004-0631 to this issue.

iDEFENSE also reported that Adobe Acrobat Reader 5.0 contains an input
validation error in its uuencoding feature. An attacker could create a
file with a specially crafted file name which could lead to arbitrary
command execution on a victim's machine. The Common Vulnerabilities
and Exposures project has assigned the name CVE-2004-0630 to this

All users of Acrobat Reader are advised to upgrade to this updated
package, which is not vulnerable to these issues.

See also :


Solution :

Update the affected acroread and / or acroread-plugin packages.

Risk factor :

Critical / CVSS Base Score : 10.0

Family: Red Hat Local Security Checks

Nessus Plugin ID: 14380 ()

Bugtraq ID:

CVE ID: CVE-2004-0630

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now