Adobe Reader < 8.1.1 Crafted PDF File Arbitrary Code Execution

high Nessus Plugin ID 27584


The PDF file viewer on the remote Windows host allows execution of arbitrary code.


The installation of Adobe Reader on the remote host allows execution of arbitrary code by means of a specially crafted PDF file with a malicious 'mailto:' link.

Note that the issue only exists on systems running Windows XP or Windows 2003 with Internet Explorer 7.0.


Upgrade to Adobe Reader 8.1.1 or later or disable 'mailto' support as described in the vendor advisory above.

See Also

Plugin Details

Severity: High

ID: 27584

File Name: adobe_reader_811.nasl

Version: 1.21

Type: local

Agent: windows

Family: Windows

Published: 10/26/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: High

Score: 8.9


Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:adobe:acrobat_reader

Required KB Items: SMB/Acroread/Version, Host/OS/smb, SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/22/2007

Vulnerability Publication Date: 9/20/2007

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Reference Information

CVE: CVE-2007-5020

BID: 25748

CWE: 94