FreeBSD : acroread -- plug-in buffer overflow vulnerability (f74dc01b-0e83-11da-bc08-0001020eed82)

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

A Adobe Security Advisory reports :

The identified vulnerability is a buffer overflow within a core
application plug-in, which is part of Adobe Acrobat and Adobe Reader.
If a malicious file were opened it could trigger a buffer overflow as
the file is being loaded into Adobe Acrobat and Adobe Reader. A buffer
overflow can cause the application to crash and increase the risk of
malicious code execution.

See also :

http://www.adobe.com/support/techdocs/321644.html
http://www.nessus.org/u?327cc4cb

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 21540 (freebsd_pkg_f74dc01b0e8311dabc080001020eed82.nasl)

Bugtraq ID:

CVE ID: CVE-2005-2470

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now