Lucene search

K
nessusThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.ADOBE_READER_APSB13-22.NASL
HistorySep 11, 2013 - 12:00 a.m.

Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)

2013-09-1100:00:00
This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
30

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.513 Medium

EPSS

Percentile

97.6%

The version of Adobe Reader installed on the remote host is earlier than 11.0.4 / 10.1.8. It is, therefore, affected by multiple vulnerabilities :

  • An unspecified stack overflow issue exists that could lead to code execution. (CVE-2013-3351)

  • Unspecified memory corruption vulnerabilities exist that could lead to code execution. (CVE-2013-3352, CVE-2013-3354, CVE-2013-3355)

  • Unspecified buffer overflow errors exist that could lead to code execution. (CVE-2013-3353, CVE-2013-3356)

  • Unspecified integer overflow errors exist that could lead to code execution. (CVE-2013-3357, CVE-2013-3358)

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(69846);
  script_version("1.12");
  script_cvs_date("Date: 2019/11/27");

  script_cve_id(
    "CVE-2013-3351",
    "CVE-2013-3352",
    "CVE-2013-3353",
    "CVE-2013-3354",
    "CVE-2013-3355",
    "CVE-2013-3356",
    "CVE-2013-3357",
    "CVE-2013-3358"
  );
  script_bugtraq_id(
    62428,
    62429,
    62430,
    62431,
    62432,
    62433,
    62435,
    62436
  );

  script_name(english:"Adobe Reader < 11.0.4 / 10.1.8 Multiple Vulnerabilities (APSB13-22)");
  script_summary(english:"Checks version of Adobe Reader");

  script_set_attribute(attribute:"synopsis", value:
"The version of Adobe Reader on the remote Windows host is affected by
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Adobe Reader installed on the remote host is earlier
than 11.0.4 / 10.1.8.  It is, therefore, affected by multiple
vulnerabilities :

  - An unspecified stack overflow issue exists that could
    lead to code execution. (CVE-2013-3351)

  - Unspecified memory corruption vulnerabilities exist that
    could lead to code execution. (CVE-2013-3352,
    CVE-2013-3354, CVE-2013-3355)

  - Unspecified buffer overflow errors exist that could
    lead to code execution. (CVE-2013-3353, CVE-2013-3356)

  - Unspecified integer overflow errors exist that could
    lead to code execution. (CVE-2013-3357, CVE-2013-3358)");
  script_set_attribute(attribute:"see_also", value:"http://www.zerodayinitiative.com/advisories/ZDI-13-230/");
  script_set_attribute(attribute:"see_also", value:"http://www.adobe.com/support/security/bulletins/apsb13-22.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Adobe Reader 11.0.4 / 10.1.8 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-3358");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/09/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/09/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/11");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:acrobat_reader");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("adobe_reader_installed.nasl");
  script_require_keys("SMB/Acroread/Version");

  exit(0);
}

include('audit.inc');
include('global_settings.inc');

info =  '';
info2 = '';
vuln = 0;
vers = get_kb_list('SMB/Acroread/Version');
if (isnull(vers)) audit(AUDIT_KB_MISSING, 'SMB/Acroread/Version');

foreach version (vers)
{
  ver = split(version, sep:'.', keep:FALSE);
  for (i=0; i<max_index(ver); i++)
    ver[i] = int(ver[i]);

  path = get_kb_item('SMB/Acroread/'+version+'/Path');
  if (isnull(path)) path = 'n/a';

  verui = get_kb_item('SMB/Acroread/'+version+'/Version_UI');
  if (isnull(verui)) verui = version;

  if (
    (ver[0] == 10 && ver[1] < 1) ||
    (ver[0] == 10 && ver[1] == 1 && ver[2] < 8) ||
    (ver[0] == 11 && ver[1] == 0 && ver[2] < 4)
  )
  {
    vuln++;
    info += '\n  Path              : '+path+
            '\n  Installed version : '+verui+
            '\n  Fixed version     : 11.0.4 / 10.1.8\n';
  }
  else
    info2 += " and " + verui;
}

if (info)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  if (report_verbosity > 0)
  {
    if (vuln > 1) s = "s of Adobe Reader are";
    else s = " of Adobe Reader is";

    report =
      '\nThe following vulnerable instance'+s+' installed on the'+
      '\nremote host :\n'+
      info;
    security_hole(port:port, extra:report);
  }
  else security_hole(port);

  exit(0);
}

if (info2)
{
  info2 -= " and ";
  if (" and " >< info2) be = "are";
  else be = "is";

  exit(0, "The host is not affected since Adobe Reader "+info2+" "+be+" installed.");
}
else exit(1, "Unexpected error - 'info2' is empty.");
VendorProductVersionCPE
adobeacrobat_readercpe:/a:adobe:acrobat_reader

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.513 Medium

EPSS

Percentile

97.6%