FreeBSD : acroread -- buffer overflow vulnerability (70c59485-ee5a-11d9-8310-0001020eed82)

This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

An Adobe Security Advisory reports :

A vulnerability within Adobe Reader has been identified. Under certain
circumstances, remote exploitation of a buffer overflow in Adobe
Reader could allow an attacker to execute arbitrary code.

If exploited, it could allow the execution of arbitrary code under the
privileges of the local user. Remote exploitation is possible if the
malicious PDF document is sent as an email attachment or if the PDF
document is accessed via a web link.

See also :

http://www.adobe.com/support/techdocs/329083.html
http://marc.info/?l=bugtraq&m=112059685332569
http://www.nessus.org/u?0d85d450

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 18979 (freebsd_pkg_70c59485ee5a11d983100001020eed82.nasl)

Bugtraq ID:

CVE ID: CVE-2005-1625

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now