Lucene search

K
nessusThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.MACOS_ADOBE_READER_APSB19-13.NASL
HistoryFeb 21, 2019 - 12:00 a.m.

Adobe Reader <= 2019.010.20091 Vulnerability (APSB19-13) (macOS)

2019-02-2100:00:00
This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
28

The version of Adobe Reader installed on the remote macOS host is prior to 2019.010.20091. It is, therefore, affected by a vulnerability as referenced in the APSB19-13 advisory.

  • Data leakage (sensitive) potentially leading to Information Disclosure (CVE-2019-7815)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(122366);
  script_version("1.5");
  script_cvs_date("Date: 2019/04/11 12:53:48");

  script_cve_id("CVE-2019-7089", "CVE-2019-7815");

  script_name(english:"Adobe Reader <= 2019.010.20091 Vulnerability (APSB19-13) (macOS)");
  script_summary(english:"Checks the version of Adobe Reader.");

  script_set_attribute(attribute:"synopsis", value:
"The version of Adobe Reader installed on the remote macOS host is
affected by a vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Adobe Reader installed on the remote macOS host is
prior to 2019.010.20091. It is, therefore, affected by a vulnerability
as referenced in the APSB19-13 advisory.

  - Data leakage (sensitive) potentially leading to
    Information Disclosure (CVE-2019-7815)

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/acrobat/apsb19-13.html");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Adobe Reader version 2019.010.20098 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-7815");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploited_by_malware", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/02/21");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/02/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/02/21");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:acrobat_reader");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"MacOS X Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("macosx_adobe_reader_installed.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version", "installed_sw/Adobe Reader");

  exit(0);
}

include("vcf.inc");
include("vcf_extras.inc");

get_kb_item_or_exit("Host/local_checks_enabled");
os = get_kb_item("Host/MacOSX/Version");
if (empty_or_null(os)) audit(AUDIT_OS_NOT, "Mac OS X");

app_info = vcf::get_app_info(app:"Adobe Reader");

# vcf::adobe_reader::check_version_and_report will
# properly separate tracks when checking constraints.
# x.y.20zzz = DC Continuous
# x.y.30zzz = DC Classic
constraints = [
  { "min_version" : "15.6", "max_version" : "19.010.20091", "fixed_version" : "19.010.20098" }
];
vcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
VendorProductVersionCPE
adobeacrobat_readercpe:/a:adobe:acrobat_reader