8 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.973 High
EPSS
Percentile
99.9%
The version of Adobe Acrobat installed on the remote host is earlier than 9.2 / 8.1.7 / 7.1.4. Such versions are reportedly affected by multiple vulnerabilities :
A heap overflow vulnerability. (CVE-2009-3459)
A memory corruption issue. (CVE-2009-2985)
Multiple heap overflow vulnerabilities. (CVE-2009-2986)
An invalid array index issue that could lead to code execution. (CVE-2009-2990)
Multiple input validation vulnerabilities that could lead to code execution. (CVE-2009-2993)
A buffer overflow issue. (CVE-2009-2994)
A heap overflow vulnerability. (CVE-2009-2997)
An input validation issue that could lead to code execution. (CVE-2009-2998)
An input validation issue that could lead to code execution. (CVE-2009-3458)
A memory corruption issue. (CVE-2009-3460)
An issue that could allow a malicious user to bypass file extension security controls. (CVE-2009-3461)
An integer overflow vulnerability. (CVE-2009-2989)
A memory corruption issue that leads to a denial of service. (CVE-2009-2983)
An integer overflow that leads to a denial of service.
(CVE-2009-2980)
A memory corruption issue that leads to a denial of service. (CVE-2009-2996)
An image decoder issue that leads to a denial of service.
(CVE-2009-2984)
An input validation issue that could lead to a bypass of Trust Manager restrictions. (CVE-2009-2981)
A certificate is used that, if compromised, could be used in a social engineering attack. (CVE-2009-2982)
A stack overflow issue that could lead to a denial of service. (CVE-2009-3431)
A XMP-XML entity expansion issue that could lead to a denial of service attack. (CVE-2009-2979)
A remote denial of service issue in the ActiveX control.
(CVE-2009-2987)
An input validation issue. (CVE-2009-2988)
An input validation issue specific to the ActiveX control. (CVE-2009-2992)
A cross-site scripting issue when the browser plugin in used with Google Chrome and Opera browsers. (CVE-2007-0048, CVE-2007-0045)
#
# (C) Tenable Network Security, Inc.
#
include('compat.inc');
if (NASL_LEVEL < 3000) exit(0);
if (description)
{
script_id(42119);
script_version("1.18");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/31");
script_cve_id("CVE-2007-0048", "CVE-2007-0045", "CVE-2009-2979", "CVE-2009-2980", "CVE-2009-2981",
"CVE-2009-2982", "CVE-2009-2983", "CVE-2009-2984", "CVE-2009-2985", "CVE-2009-2986",
"CVE-2009-2987", "CVE-2009-2988", "CVE-2009-2989", "CVE-2009-2990", "CVE-2009-2991",
"CVE-2009-2992", "CVE-2009-2993", "CVE-2009-2994", "CVE-2009-2995", "CVE-2009-2996",
"CVE-2009-2997", "CVE-2009-2998", "CVE-2009-3431", "CVE-2009-3458", "CVE-2009-3459",
"CVE-2009-3460", "CVE-2009-3461");
script_bugtraq_id(
21858,
36600,
36664,
36665,
36667,
36668,
36669,
36671,
36677,
36678,
36680,
36681,
36682,
36683,
36686,
36687,
36688,
36689,
36690,
36691,
36692,
36693,
36694,
36695,
36697
);
script_xref(name:"Secunia", value:"36983");
script_name(english:"Adobe Acrobat < 9.2 / 8.1.7 / 7.1.4 Multiple Vulnerabilities (APSB09-15)");
script_summary(english:"Checks version of Adobe Acrobat");
script_set_attribute(attribute:"synopsis", value:
"The version of Adobe Acrobat on the remote Windows host is affected by
multiple vulnerabilities." );
script_set_attribute(attribute:"description", value:
"The version of Adobe Acrobat installed on the remote host is earlier
than 9.2 / 8.1.7 / 7.1.4. Such versions are reportedly affected by
multiple vulnerabilities :
- A heap overflow vulnerability. (CVE-2009-3459)
- A memory corruption issue. (CVE-2009-2985)
- Multiple heap overflow vulnerabilities. (CVE-2009-2986)
- An invalid array index issue that could lead to code
execution. (CVE-2009-2990)
- Multiple input validation vulnerabilities that could
lead to code execution. (CVE-2009-2993)
- A buffer overflow issue. (CVE-2009-2994)
- A heap overflow vulnerability. (CVE-2009-2997)
- An input validation issue that could lead to code
execution. (CVE-2009-2998)
- An input validation issue that could lead to code
execution. (CVE-2009-3458)
- A memory corruption issue. (CVE-2009-3460)
- An issue that could allow a malicious user to bypass
file extension security controls. (CVE-2009-3461)
- An integer overflow vulnerability. (CVE-2009-2989)
- A memory corruption issue that leads to a denial of
service. (CVE-2009-2983)
- An integer overflow that leads to a denial of service.
(CVE-2009-2980)
- A memory corruption issue that leads to a denial of
service. (CVE-2009-2996)
- An image decoder issue that leads to a denial of service.
(CVE-2009-2984)
- An input validation issue that could lead to a bypass
of Trust Manager restrictions. (CVE-2009-2981)
- A certificate is used that, if compromised, could be used
in a social engineering attack. (CVE-2009-2982)
- A stack overflow issue that could lead to a denial of
service. (CVE-2009-3431)
- A XMP-XML entity expansion issue that could lead to a
denial of service attack. (CVE-2009-2979)
- A remote denial of service issue in the ActiveX control.
(CVE-2009-2987)
- An input validation issue. (CVE-2009-2988)
- An input validation issue specific to the ActiveX
control. (CVE-2009-2992)
- A cross-site scripting issue when the browser plugin in
used with Google Chrome and Opera browsers.
(CVE-2007-0048, CVE-2007-0045)
"
);
script_set_attribute(
attribute:'see_also',
value:'http://www.adobe.com/support/security/bulletins/apsb09-15.html'
);
script_set_attribute(
attribute:'solution',
value:'Upgrade to Adobe Acrobat 9.2 / 8.1.7 / 7.1.4 or later.'
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2009-2980");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Adobe FlateDecode Stream Predictor 02 Integer Overflow');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_cwe_id(20, 119, 189, 264, 310, 399);
script_set_attribute(attribute:"vuln_publication_date", value:"2009/10/09");
script_set_attribute(attribute:"patch_publication_date", value:"2009/10/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2009/10/14");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:acrobat");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:'Windows');
script_copyright(english:"This script is Copyright (C) 2009-2024 Tenable Network Security, Inc.");
script_dependencies('adobe_acrobat_installed.nasl');
script_require_keys('installed_sw/Adobe Acrobat');
exit(0);
}
include('install_func.inc');
var install = get_single_install(app_name:'Adobe Acrobat', exit_if_unknown_ver:TRUE);
var version = install.version;
var ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
ver[i] = int(ver[i]);
if (
ver[0] < 7 ||
(
ver[0] == 7 &&
(
ver[1] < 1 ||
(ver[1] == 1 && ver[2] < 4)
)
) ||
(
ver[0] == 8 &&
(
ver[1] < 1 ||
(ver[1] == 1 && ver[2] < 7)
)
) ||
(
ver[0] == 9 && ver[1] < 2
)
)
{
var version_ui = install.display_version;
if (report_verbosity > 0 && version_ui)
{
var path = install.path;
if (isnull(path)) path = 'n/a';
var report = string(
'\n',
' Product : Adobe Acrobat\n',
' Path : ', path, '\n',
' Installed version : ', version_ui, '\n',
' Fix : 9.2 / 8.1.7 / 7.1.4\n'
);
security_hole(port:get_kb_item('SMB/transport'), extra:report);
}
else security_hole(get_kb_item('SMB/transport'));
}
else exit(0, "The host is not affected since Adobe Acrobat "+version+" is installed.");
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2980
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2983
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2985
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2986
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2991
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2992
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2993
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2994
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2996
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2997
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2998
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3431
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3458
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3459
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3460
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3461
www.adobe.com/support/security/bulletins/apsb09-15.html