Adobe Reader < 8.1.3 / 9.0 Multiple Vulnerabilities

This script is Copyright (C) 2008-2017 Tenable Network Security, Inc.


Synopsis :

The PDF file viewer on the remote Windows host is affected by multiple
vulnerabilities.

Description :

The version of Adobe Reader installed on the remote host is earlier
than 8.1.3. Such versions are reportedly affected by multiple
vulnerabilities :

- There is a publicly-published denial of service issue
(CVE-2008-2549).

- A stack-based buffer overflow when parsing format
strings containing a floating point specifier in the
'util.printf()' JavaScript function may allow an
attacker to execute arbitrary code (CVE-2008-2992).

- Multiple input validation errors could lead to code
execution (CVE-2008-4812).

- Multiple input validation issues could lead to remote
code execution. (CVE-2008-4813)

- A heap corruption vulnerability in an AcroJS function
available to scripting code inside of a PDF document
could lead to remote code execution. (CVE-2008-4817)

- An input validation issue in the Download Manager used
by Adobe Reader could lead to remote code execution
during the download process (CVE-2008-5364).

- An issue in the Download Manager used by Adobe Reader
could lead to a user's Internet Security options being
changed during the download process (CVE-2008-4816).

- An input validation issue in a JavaScript method could
lead to remote code execution (CVE-2008-4814).

See also :

http://secunia.com/secunia_research/2008-14/
http://www.coresecurity.com/content/adobe-reader-buffer-overflow
http://www.nessus.org/u?4d149b32
http://www.nessus.org/u?b4f90b46
http://www.nessus.org/u?f6f3b943
http://www.zerodayinitiative.com/advisories/ZDI-08-072
http://www.zerodayinitiative.com/advisories/ZDI-08-073
http://www.zerodayinitiative.com/advisories/ZDI-08-074
http://www.securityfocus.com/archive/1/498027/30/0/threaded
http://www.securityfocus.com/archive/1/498032/30/0/threaded
http://www.adobe.com/support/security/bulletins/apsb08-19.html

Solution :

Upgrade to Adobe Reader 9.0 / 8.1.3 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 34695 (adobe_reader_813.nasl)

Bugtraq ID: 29420
30035
32100
32103
32105

CVE ID: CVE-2008-2549
CVE-2008-2992
CVE-2008-4812
CVE-2008-4813
CVE-2008-4814
CVE-2008-4816
CVE-2008-4817
CVE-2008-5364

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now