The version of Adobe Acrobat installed on the remote Windows host is a version prior to 17.012.30262, 20.005.30381, or 22.002.20191. It is, therefore, affected by multiple vulnerabilities.
Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2022-24102, CVE-2022-24103, CVE-2022-24104)
Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory.
An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2022-28837)
Acrobat Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2022-28838)
Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 20.005.30334 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2022-35669)
Use After Free (CWE-416) potentially leading to Arbitrary code execution (CVE-2022-35665)
Improper Input Validation (CWE-20) potentially leading to Arbitrary code execution (CVE-2022-35666)
Out-of-bounds Write (CWE-787) potentially leading to Arbitrary code execution (CVE-2022-35667)
Improper Input Validation (CWE-20) potentially leading to Memory leak (CVE-2022-35668)
Use After Free (CWE-416) potentially leading to Memory leak (CVE-2022-35670)
Out-of-bounds Read (CWE-125) potentially leading to Memory leak (CVE-2022-35671, CVE-2022-35678)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(163958);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/03/23");
script_cve_id(
"CVE-2022-35665",
"CVE-2022-35666",
"CVE-2022-35667",
"CVE-2022-35668",
"CVE-2022-35670",
"CVE-2022-35671",
"CVE-2022-35678"
);
script_xref(name:"IAVA", value:"2022-A-0323-S");
script_name(english:"Adobe Acrobat < 17.012.30262 / 20.005.30381 / 22.002.20191 Multiple Vulnerabilities (APSB22-39)");
script_set_attribute(attribute:"synopsis", value:
"The version of Adobe Acrobat installed on the remote Windows host is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Adobe Acrobat installed on the remote Windows host is a version prior to 17.012.30262, 20.005.30381, or
22.002.20191. It is, therefore, affected by multiple vulnerabilities.
- Acrobat Reader DC versions 20.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and
earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution in
the context of the current user. Exploitation of this issue requires user interaction in that a victim
must open a malicious file. (CVE-2022-24102, CVE-2022-24103, CVE-2022-24104)
- Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x (and
earlier) are affected by a use-after-free vulnerability that could lead to disclosure of sensitive memory.
An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this
issue requires user interaction in that a victim must open a malicious file. (CVE-2022-28837)
- Acrobat Acrobat Pro DC version 22.001.2011x (and earlier), 20.005.3033x (and earlier) and 17.012.3022x
(and earlier) are affected by a use-after-free vulnerability that could result in arbitrary code execution
in the context of the current user. Exploitation of this issue requires user interaction in that a victim
must open a malicious file. (CVE-2022-28838)
- Acrobat Reader versions 22.001.20142 (and earlier), 20.005.30334 (and earlier) and 20.005.30334 (and
earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive
memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of
this issue requires user interaction in that a victim must open a malicious file. (CVE-2022-35669)
- Use After Free (CWE-416) potentially leading to Arbitrary code execution (CVE-2022-35665)
- Improper Input Validation (CWE-20) potentially leading to Arbitrary code execution (CVE-2022-35666)
- Out-of-bounds Write (CWE-787) potentially leading to Arbitrary code execution (CVE-2022-35667)
- Improper Input Validation (CWE-20) potentially leading to Memory leak (CVE-2022-35668)
- Use After Free (CWE-416) potentially leading to Memory leak (CVE-2022-35670)
- Out-of-bounds Read (CWE-125) potentially leading to Memory leak (CVE-2022-35671, CVE-2022-35678)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/acrobat/apsb22-39.html");
script_set_attribute(attribute:"solution", value:
"Upgrade to Adobe Acrobat version 17.012.30262 / 20.005.30381 / 22.002.20191 or later.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-35667");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(20, 125, 416, 787);
script_set_attribute(attribute:"vuln_publication_date", value:"2022/04/12");
script_set_attribute(attribute:"patch_publication_date", value:"2022/08/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/08/09");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:acrobat");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2022-2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("adobe_acrobat_installed.nasl");
script_require_keys("SMB/Registry/Enumerated", "installed_sw/Adobe Acrobat");
exit(0);
}
include('vcf.inc');
include('vcf_extras.inc');
get_kb_item_or_exit('SMB/Registry/Enumerated');
var app_info = vcf::get_app_info(app:'Adobe Acrobat', win_local:TRUE);
# vcf::adobe_reader::check_version_and_report will
# properly separate tracks when checking constraints.
# x.y.30zzz = DC Classic
# x.y.20zzz = DC Continuous
var constraints = [
{ 'min_version' : '15.7', 'max_version' : '22.001.20169', 'fixed_version' : '22.002.20191' },
{ 'min_version' : '20.1', 'max_version' : '20.005.30362', 'fixed_version' : '20.005.30381' },
{ 'min_version' : '17.8', 'max_version' : '17.012.30249', 'fixed_version' : '17.012.30262' }
];
vcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35665
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35666
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35667
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35668
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35670
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35671
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35678
helpx.adobe.com/security/products/acrobat/apsb22-39.html