Adobe Reader < 8.1.1 Crafted PDF File Arbitrary Code Execution

High Nessus Plugin ID 27584


The PDF file viewer on the remote Windows host allows execution of arbitrary code.


The installation of Adobe Reader on the remote host allows execution of arbitrary code by means of a specially crafted PDF file with a malicious 'mailto:' link.

Note that the issue only exists on systems running Windows XP or Windows 2003 with Internet Explorer 7.0.


Upgrade to Adobe Reader 8.1.1 or later or disable 'mailto' support as described in the vendor advisory above.

See Also

Plugin Details

Severity: High

ID: 27584

File Name: adobe_reader_811.nasl

Version: $Revision: 1.19 $

Type: local

Agent: windows

Family: Windows

Published: 2007/10/26

Modified: 2016/11/11

Dependencies: 10785, 13855, 20836

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:adobe:acrobat_reader

Required KB Items: SMB/Acroread/Version, Host/OS/smb, SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/10/22

Vulnerability Publication Date: 2007/09/20

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Reference Information

CVE: CVE-2007-5020

BID: 25748

OSVDB: 38068

CWE: 94