Lucene search

K
nvd[email protected]NVD:CVE-2014-0568
HistorySep 17, 2014 - 10:55 a.m.

CVE-2014-0568

2014-09-1710:55:06
web.nvd.nist.gov
6

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.6

Confidence

Low

EPSS

0.013

Percentile

85.9%

The NtSetInformationFile system call hook feature in Adobe Reader and Acrobat 10.x before 10.1.12 and 11.x before 11.0.09 on Windows allows attackers to bypass a sandbox protection mechanism, and consequently execute native code in a privileged context, via an NTFS junction attack.

Affected configurations

Nvd
Node
adobeacrobat_readerMatch10.0
OR
adobeacrobat_readerMatch10.0.1
OR
adobeacrobat_readerMatch10.0.2
OR
adobeacrobat_readerMatch10.0.3
OR
adobeacrobat_readerMatch10.1
OR
adobeacrobat_readerMatch10.1.1
OR
adobeacrobat_readerMatch10.1.2
OR
adobeacrobat_readerMatch10.1.3
OR
adobeacrobat_readerMatch10.1.4
OR
adobeacrobat_readerMatch10.1.5
OR
adobeacrobat_readerMatch10.1.6
OR
adobeacrobat_readerMatch10.1.7
OR
adobeacrobat_readerMatch10.1.8
OR
adobeacrobat_readerMatch10.1.9
OR
adobeacrobat_readerMatch10.1.10
OR
adobeacrobat_readerMatch10.1.11
OR
adobeacrobat_readerMatch11.0
OR
adobeacrobat_readerMatch11.0.1
OR
adobeacrobat_readerMatch11.0.2
OR
adobeacrobat_readerMatch11.0.3
OR
adobeacrobat_readerMatch11.0.4
OR
adobeacrobat_readerMatch11.0.5-windows
OR
adobeacrobat_readerMatch11.0.6
OR
adobeacrobat_readerMatch11.0.7
OR
adobeacrobat_readerMatch11.0.8
AND
microsoftwindows
Node
adobeacrobatMatch10.0
OR
adobeacrobatMatch10.0-pro
OR
adobeacrobatMatch10.0.1
OR
adobeacrobatMatch10.0.1-pro
OR
adobeacrobatMatch10.0.2
OR
adobeacrobatMatch10.0.3
OR
adobeacrobatMatch10.1
OR
adobeacrobatMatch10.1.1
OR
adobeacrobatMatch10.1.2
OR
adobeacrobatMatch10.1.3
OR
adobeacrobatMatch10.1.4
OR
adobeacrobatMatch10.1.5
OR
adobeacrobatMatch10.1.6
OR
adobeacrobatMatch10.1.7
OR
adobeacrobatMatch10.1.8
OR
adobeacrobatMatch10.1.9
OR
adobeacrobatMatch10.1.10
OR
adobeacrobatMatch10.1.11
OR
adobeacrobatMatch11.0
OR
adobeacrobatMatch11.0.1
OR
adobeacrobatMatch11.0.2
OR
adobeacrobatMatch11.0.3
OR
adobeacrobatMatch11.0.4
OR
adobeacrobatMatch11.0.5-windows
OR
adobeacrobatMatch11.0.6
OR
adobeacrobatMatch11.0.7
OR
adobeacrobatMatch11.0.8
AND
microsoftwindows
VendorProductVersionCPE
adobeacrobat_reader10.0cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
adobeacrobat_reader10.0.1cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*
adobeacrobat_reader10.0.2cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*
adobeacrobat_reader10.0.3cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*
adobeacrobat_reader10.1cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*
adobeacrobat_reader10.1.1cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*
adobeacrobat_reader10.1.2cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*
adobeacrobat_reader10.1.3cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*
adobeacrobat_reader10.1.4cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*
adobeacrobat_reader10.1.5cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*
Rows per page:
1-10 of 531

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

6.6

Confidence

Low

EPSS

0.013

Percentile

85.9%