9.3 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.355 Low
EPSS
Percentile
97.2%
Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 Supplementary.
The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Adobe Reader allows users to view and print documents in Portable Document Format (PDF).
This update fixes multiple vulnerabilities in Adobe Reader. These vulnerabilities are detailed on the Adobe security pages APSA10-01 and APSB10-15, listed in the References section. A specially crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened.
(CVE-2010-1240, CVE-2010-1285, CVE-2010-1295, CVE-2010-1297, CVE-2010-2168, CVE-2010-2201, CVE-2010-2202, CVE-2010-2203, CVE-2010-2204, CVE-2010-2205, CVE-2010-2206, CVE-2010-2207, CVE-2010-2208, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, CVE-2010-2212)
All Adobe Reader users should install these updated packages. They contain Adobe Reader version 9.3.3, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2010:0503. The text
# itself is copyright (C) Red Hat, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(47869);
script_version("1.53");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/06/08");
script_cve_id(
"CVE-2010-1240",
"CVE-2010-1285",
"CVE-2010-1295",
"CVE-2010-1297",
"CVE-2010-2168",
"CVE-2010-2201",
"CVE-2010-2202",
"CVE-2010-2203",
"CVE-2010-2204",
"CVE-2010-2205",
"CVE-2010-2206",
"CVE-2010-2207",
"CVE-2010-2208",
"CVE-2010-2209",
"CVE-2010-2210",
"CVE-2010-2211",
"CVE-2010-2212"
);
script_bugtraq_id(
40586,
41230,
41231,
41232,
41234,
41235,
41236,
41237,
41238,
41239,
41240,
41241,
41242,
41243,
41244,
41245
);
script_xref(name:"RHSA", value:"2010:0503");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/06/22");
script_name(english:"RHEL 4 / 5 : acroread (RHSA-2010:0503)");
script_set_attribute(attribute:"synopsis", value:
"The remote Red Hat host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"Updated acroread packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise
Linux 5 Supplementary.
The Red Hat Security Response Team has rated this update as having
critical security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for
each vulnerability from the CVE links in the References section.
Adobe Reader allows users to view and print documents in Portable
Document Format (PDF).
This update fixes multiple vulnerabilities in Adobe Reader. These
vulnerabilities are detailed on the Adobe security pages APSA10-01 and
APSB10-15, listed in the References section. A specially crafted PDF
file could cause Adobe Reader to crash or, potentially, execute
arbitrary code as the user running Adobe Reader when opened.
(CVE-2010-1240, CVE-2010-1285, CVE-2010-1295, CVE-2010-1297,
CVE-2010-2168, CVE-2010-2201, CVE-2010-2202, CVE-2010-2203,
CVE-2010-2204, CVE-2010-2205, CVE-2010-2206, CVE-2010-2207,
CVE-2010-2208, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211,
CVE-2010-2212)
All Adobe Reader users should install these updated packages. They
contain Adobe Reader version 9.3.3, which is not vulnerable to these
issues. All running instances of Adobe Reader must be restarted for
the update to take effect.");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-1240");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-1285");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-1295");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-1297");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2168");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2201");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2202");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2203");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2204");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2205");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2206");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2207");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2208");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2209");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2210");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2211");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2010-2212");
script_set_attribute(attribute:"see_also", value:"https://www.adobe.com/support/security/advisories/apsa10-01.html");
script_set_attribute(attribute:"see_also", value:"https://www.adobe.com/support/security/bulletins/apsb10-15.html");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2010:0503");
script_set_attribute(attribute:"solution", value:
"Update the affected acroread and / or acroread-plugin packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2010-2212");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Adobe PDF Escape EXE Social Engineering (No JavaScript)');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"exploit_framework_exploithub", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
script_set_attribute(attribute:"canvas_package", value:"CANVAS");
script_set_attribute(attribute:"exploithub_sku", value:"EH-11-164");
script_set_attribute(attribute:"vuln_publication_date", value:"2010/04/05");
script_set_attribute(attribute:"patch_publication_date", value:"2010/06/30");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/28");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:acroread");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:acroread-plugin");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4.8");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5");
script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5.4");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Red Hat Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2010-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat");
os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat");
os_ver = os_ver[1];
if (! preg(pattern:"^(4|5)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 4.x / 5.x", "Red Hat " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu);
if (cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i386", cpu);
yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo");
if (!empty_or_null(yum_updateinfo))
{
rhsa = "RHSA-2010:0503";
yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);
if (!empty_or_null(yum_report))
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : yum_report
);
exit(0);
}
else
{
audit_message = "affected by Red Hat security advisory " + rhsa;
audit(AUDIT_OS_NOT, audit_message);
}
}
else
{
flag = 0;
if (rpm_check(release:"RHEL4", cpu:"i386", reference:"acroread-9.3.3-2.el4")) flag++;
if (rpm_check(release:"RHEL4", cpu:"i386", reference:"acroread-plugin-9.3.3-2.el4")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"acroread-9.3.3-1.el5")) flag++;
if (rpm_check(release:"RHEL5", cpu:"i386", reference:"acroread-plugin-9.3.3-1.el5")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : rpm_report_get() + redhat_report_package_caveat()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "acroread / acroread-plugin");
}
}
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | enterprise_linux | acroread | p-cpe:/a:redhat:enterprise_linux:acroread |
redhat | enterprise_linux | acroread-plugin | p-cpe:/a:redhat:enterprise_linux:acroread-plugin |
redhat | enterprise_linux | 4 | cpe:/o:redhat:enterprise_linux:4 |
redhat | enterprise_linux | 4.8 | cpe:/o:redhat:enterprise_linux:4.8 |
redhat | enterprise_linux | 5 | cpe:/o:redhat:enterprise_linux:5 |
redhat | enterprise_linux | 5.4 | cpe:/o:redhat:enterprise_linux:5.4 |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1240
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1285
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1295
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1297
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2168
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2201
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2202
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2203
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2204
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2205
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2206
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2207
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2208
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2209
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2210
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2211
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2212
access.redhat.com/errata/RHSA-2010:0503
access.redhat.com/security/cve/cve-2010-1240
access.redhat.com/security/cve/cve-2010-1285
access.redhat.com/security/cve/cve-2010-1295
access.redhat.com/security/cve/cve-2010-1297
access.redhat.com/security/cve/cve-2010-2168
access.redhat.com/security/cve/cve-2010-2201
access.redhat.com/security/cve/cve-2010-2202
access.redhat.com/security/cve/cve-2010-2203
access.redhat.com/security/cve/cve-2010-2204
access.redhat.com/security/cve/cve-2010-2205
access.redhat.com/security/cve/cve-2010-2206
access.redhat.com/security/cve/cve-2010-2207
access.redhat.com/security/cve/cve-2010-2208
access.redhat.com/security/cve/cve-2010-2209
access.redhat.com/security/cve/cve-2010-2210
access.redhat.com/security/cve/cve-2010-2211
access.redhat.com/security/cve/cve-2010-2212
www.adobe.com/support/security/advisories/apsa10-01.html
www.adobe.com/support/security/bulletins/apsb10-15.html