Lucene search

K
nessusThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.NITRO_READER_2_5_0_45.NASL
HistoryJun 03, 2013 - 12:00 a.m.

Nitro Reader <= 2.5.0.45 Memory Corruption

2013-06-0300:00:00
This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
15

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

71.7%

The version of Nitro Reader installed on the remote Windows host is less than or equal to 2.5.0.45 and is, therefore, reportedly affected by a memory corruption vulnerability when parsing specially crafted PDF files.

#
# (C) Tenable network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(66765);
  script_version("1.7");
  script_cvs_date("Date: 2019/12/04");

  script_cve_id("CVE-2013-3552");
  script_bugtraq_id(60180);
  script_xref(name:"MSVR", value:"MSVR13-006");

  script_name(english:"Nitro Reader <= 2.5.0.45 Memory Corruption");
  script_summary(english:"Checks version of Nitro Reader");

  script_set_attribute(attribute:"synopsis", value:
"The remote host has a PDF reader installed that is affected by a memory
corruption vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of Nitro Reader installed on the remote Windows host is
less than or equal to 2.5.0.45 and is, therefore, reportedly affected by
a memory corruption vulnerability when parsing specially crafted PDF
files.");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Nitro Reader 3.0.4.4 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-3552");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/05/21");
  script_set_attribute(attribute:"patch_publication_date", value:"2012/10/15");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/06/03");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:nitropdf:nitro_pdf");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("nitro_reader_installed.nasl");
  script_require_keys("SMB/Nitro Reader/installed");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

info = '';
info2 = '';
vuln = 0;
installs = get_kb_list("SMB/Nitro Reader/*/Path");
if (isnull(installs)) audit(AUDIT_KB_MISSING, 'SMB/Nitro Reader/*/Path');

vuln = 0;
foreach install (keys(installs))
{
  path = installs[install];
  version = install - 'SMB/Nitro Reader/' - '/Path';

  if (ver_compare(ver:version, fix:'2.5.0.45', strict:FALSE) <= 0)
  {
    info +=
      '\n  Path              : ' + path +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 3.0.4.4\n';
    vuln++;
  }
  else
    info2 += ' and ' + version;
}

if (vuln)
{
  port = get_kb_item("SMB/transport");
  if (!port) port = 445;

  if (report_verbosity > 0)
  {
    if (vuln > 1) s = "s of Nitro Reader are";
    else s = " of Nitro Reader is";

    report =
      '\nThe following vulnerable instance' + s + ' installed on the' +
      '\nremote host :\n'+
      info;
    security_hole(port:port, extra:report);
  }
  else security_hole(port);

  exit(0);
}

if (info2)
{
  info2 -= ' and ';
  if (' and ' >< info2) be = 'are';
  else be = 'is';

  exit(0, 'The host is not affected since Nitro Reader '+info2+' '+be+' installed.');
}
else exit(1, 'Unexpected error -  \'info2\' is empty.');

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

71.7%

Related for NITRO_READER_2_5_0_45.NASL