FreeBSD : acroread -- buffer overflow vulnerability (70c59485-ee5a-11d9-8310-0001020eed82)

medium Nessus Plugin ID 18979

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

An Adobe Security Advisory reports :

A vulnerability within Adobe Reader has been identified. Under certain circumstances, remote exploitation of a buffer overflow in Adobe Reader could allow an attacker to execute arbitrary code.

If exploited, it could allow the execution of arbitrary code under the privileges of the local user. Remote exploitation is possible if the malicious PDF document is sent as an email attachment or if the PDF document is accessed via a web link.

Solution

Update the affected packages.

See Also

https://www.adobe.com/support/techdocs/329083.html

https://marc.info/?l=bugtraq&m=112059685332569

http://www.nessus.org/u?d4fe6af1

Plugin Details

Severity: Medium

ID: 18979

File Name: freebsd_pkg_70c59485ee5a11d983100001020eed82.nasl

Version: 1.19

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:acroread, p-cpe:/a:freebsd:freebsd:acroread4, p-cpe:/a:freebsd:freebsd:acroread5, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/6/2005

Vulnerability Publication Date: 7/5/2005

Reference Information

CVE: CVE-2005-1625