Lucene search

K

Nuance PDF Reader Multiple Memory Corruption Vulnerabilities

🗓️ 11 Mar 2013 00:00:00Reported by Copyright (C) 2013 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 10 Views

Nuance PDF Reader Multiple Memory Corruption Vulnerabilitie

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2013-0113
24 Feb 201311:00
cvelist
OpenVAS
Nuance PDF Reader Multiple Memory Corruption Vulnerabilities
11 Mar 201300:00
openvas
NVD
CVE-2013-0113
24 Feb 201311:48
nvd
Prion
Memory corruption
24 Feb 201311:48
prion
CERT
Nuance PDF viewing products contain multiple vulnerabilities
7 Feb 201300:00
cert
CVE
CVE-2013-0113
24 Feb 201311:48
cve
# SPDX-FileCopyrightText: 2013 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.803329");
  script_version("2023-07-27T05:05:08+0000");
  script_cve_id("CVE-2013-0113");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2023-07-27 05:05:08 +0000 (Thu, 27 Jul 2023)");
  script_tag(name:"creation_date", value:"2013-03-11 15:51:39 +0530 (Mon, 11 Mar 2013)");
  script_name("Nuance PDF Reader Multiple Memory Corruption Vulnerabilities");
  script_xref(name:"URL", value:"http://www.kb.cert.org/vuls/id/248449");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/57851");
  script_xref(name:"URL", value:"http://en.securitylab.ru/nvd/438057.php");
  script_xref(name:"URL", value:"http://secunia.com/advisories/cve_reference/CVE-2013-0113");
  script_copyright("Copyright (C) 2013 Greenbone AG");
  script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"registry");
  script_family("General");
  script_dependencies("gb_nuance_pdf_reader_detect_win.nasl");
  script_mandatory_keys("Nuance/PDFReader/Win/Ver");
  script_tag(name:"impact", value:"Successful exploitation allows an attacker to corrupt memory, execute
arbitrary code within the context of the user running the affected
application or failed attempts may cause a denial-of-service.");
  script_tag(name:"affected", value:"Nuance PDF Reader version 7.0");
  script_tag(name:"insight", value:"Multiple unspecified flaws as user input is not properly
sanitized when handling PDF files.");
  script_tag(name:"solution", value:"No known solution was made available for at least one year since the disclosure of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.");
  script_tag(name:"summary", value:"Nuance PDF Reader is prone to multiple memory-corruption vulnerabilities.");
  script_tag(name:"solution_type", value:"WillNotFix");
  exit(0);
}


ReaderVer = get_kb_item("Nuance/PDFReader/Win/Ver");

if(ReaderVer && ReaderVer == "7.00.0000")
{
  security_message( port: 0, data: "The target host was found to be vulnerable" );
  exit(0);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 Mar 2013 00:00Current
6.8Medium risk
Vulners AI Score6.8
CVSS29.3
EPSS0.0357
10
.json
Report