Adobe Reader < 8.1.1 Crafted PDF File Arbitrary Code Execution

high Nessus Plugin ID 27584

Synopsis

The PDF file viewer on the remote Windows host allows execution of arbitrary code.

Description

The installation of Adobe Reader on the remote host allows execution of arbitrary code by means of a specially crafted PDF file with a malicious 'mailto:' link.

Note that the issue only exists on systems running Windows XP or Windows 2003 with Internet Explorer 7.0.

Solution

Upgrade to Adobe Reader 8.1.1 or later or disable 'mailto' support as described in the vendor advisory above.

See Also

https://www.gnucitizen.org/blog/0day-pdf-pwns-windows/

https://www.securityfocus.com/archive/1/archive/1/480080/100/0/threaded

https://www.adobe.com/support/security/bulletins/apsb07-18.html

Plugin Details

Severity: High

ID: 27584

File Name: adobe_reader_811.nasl

Version: 1.21

Type: local

Agent: windows

Family: Windows

Published: 10/26/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:adobe:acrobat_reader

Required KB Items: SMB/Acroread/Version, Host/OS/smb, SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/22/2007

Vulnerability Publication Date: 9/20/2007

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Reference Information

CVE: CVE-2007-5020

BID: 25748

CWE: 94