activePDF Server < 3.8.6 Packet Handling Remote Overflow

Critical Nessus Plugin ID 31349


The remote Windows host contains a program that is affected by a buffer overflow vulnerability.


activePDF Server is installed on the remote host. It is used to provide PDF generation and conversion from within enterprise and web applications.

The version of activePDF Server installed on the remote host contains a heap-based buffer overflow that can be triggered by sending a packet specifying a size smaller than the actual size of the following data.
An unauthenticated, remote attacker may be able to leverage this issue to crash the affected service or execute arbitrary code.

Note that the service runs with SYSTEM privileges, so successful exploitation could lead to a complete compromise of the affected host.


Upgrade to activePDF version 3.8.6 or later.

See Also

Plugin Details

Severity: Critical

ID: 31349

File Name: activepdf_3_8_6.nasl

Version: $Revision: 1.15 $

Type: remote

Agent: windows

Family: Windows

Published: 2008/03/05

Modified: 2016/05/04

Dependencies: 17975

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:ND

Vulnerability Information

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-5397

BID: 28013

OSVDB: 42971

Secunia: 27371

CWE: 119