Lucene search

K
openvasCopyright (C) 2017 Greenbone AGOPENVAS:1361412562310811342
HistoryNov 16, 2017 - 12:00 a.m.

Adobe Reader Security Updates (APSB17-36) - Mac OS X

2017-11-1600:00:00
Copyright (C) 2017 Greenbone AG
plugins.openvas.org
23

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.692 Medium

EPSS

Percentile

98.0%

Adobe Reader is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:adobe:acrobat_reader";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.811342");
  script_version("2024-02-09T14:47:30+0000");
  script_cve_id("CVE-2017-16377", "CVE-2017-16378", "CVE-2017-16360", "CVE-2017-16388",
                "CVE-2017-16389", "CVE-2017-16390", "CVE-2017-16393", "CVE-2017-16398",
                "CVE-2017-16381", "CVE-2017-16385", "CVE-2017-16392", "CVE-2017-16395",
                "CVE-2017-16396", "CVE-2017-16363", "CVE-2017-16365", "CVE-2017-16374",
                "CVE-2017-16384", "CVE-2017-16386", "CVE-2017-16387", "CVE-2017-16368",
                "CVE-2017-16383", "CVE-2017-16391", "CVE-2017-16410", "CVE-2017-16362",
                "CVE-2017-16370", "CVE-2017-16376", "CVE-2017-16382", "CVE-2017-16394",
                "CVE-2017-16397", "CVE-2017-16399", "CVE-2017-16400", "CVE-2017-16401",
                "CVE-2017-16402", "CVE-2017-16403", "CVE-2017-16404", "CVE-2017-16405",
                "CVE-2017-16408", "CVE-2017-16409", "CVE-2017-16412", "CVE-2017-16414",
                "CVE-2017-16417", "CVE-2017-16418", "CVE-2017-16420", "CVE-2017-11293",
                "CVE-2017-16407", "CVE-2017-16413", "CVE-2017-16415", "CVE-2017-16416",
                "CVE-2017-16361", "CVE-2017-16366", "CVE-2017-16369", "CVE-2017-16380",
                "CVE-2017-16419", "CVE-2017-16367", "CVE-2017-16379", "CVE-2017-16406",
                "CVE-2017-16364", "CVE-2017-16371", "CVE-2017-16372", "CVE-2017-16373",
                "CVE-2017-16375", "CVE-2017-16411", "CVE-2017-11307", "CVE-2017-11308",
                "CVE-2017-11240", "CVE-2017-11250", "CVE-2017-11306", "CVE-2017-11253");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-09 14:47:30 +0000 (Fri, 09 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2017-12-22 19:56:00 +0000 (Fri, 22 Dec 2017)");
  script_tag(name:"creation_date", value:"2017-11-16 11:56:52 +0530 (Thu, 16 Nov 2017)");
  script_name("Adobe Reader Security Updates (APSB17-36) - Mac OS X");

  script_tag(name:"summary", value:"Adobe Reader is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to:

  - Two access of uninitialized point vulnerabilities that could result in
    remote could execution,

  - Six use after free vulnerabilities that could result in remote code execution.

  - Five buffer access with incorrect length value vulnerabilities that could
    result in remote code execution.

  - Six buffer over-read vulnerabilities that could result in remote code
    execution.

  - A buffer overflow vulnerability that could result in remote code execution.

  - A heap overflow vulnerability that could result in remote code execution.

  - Two improper validation of array index vulnerabilities that could result
    in remote code execution.

  - Multiple out-of-bounds read vulnerabilities that could result in remote code
    execution.

  - Four out-of-bounds write vulnerabilities that could result in remote code
    execution.

  - Two security bypass vulnerabilities that could result in drive-by-downloads.

  - A security bypass vulnerability that could result in information disclosure.

  - A security bypass vulnerability that could result in remote code execution.

  - A stack exhaustion vulnerability that could result in excessive resource
    consumption.

  - Three type confusion vulnerabilities that could result in remote code
    execution.

  - Six untrusted pointer dereference vulnerabilities that could result in remote
    code execution.

  Please see the references for more information on the vulnerabilities.");

  script_tag(name:"impact", value:"Successful exploitation will allow remote
  attackers to execute arbitrary code in the context of the application.
  Failed attacks may cause a denial-of-service condition. Also attackers will be
  able to gain access to potentially sensitive information, get excessive resource
  consumption and get unintentional downloads of malicious software.");

  script_tag(name:"affected", value:"Adobe Reader version 11.x before 11.0.23 on Mac OS X.");

  script_tag(name:"solution", value:"Upgrade to Adobe Reader version 11.0.23 or later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");
  script_xref(name:"URL", value:"https://helpx.adobe.com/security/products/acrobat/apsb17-36.html");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101821");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101818");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101831");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101824");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101816");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101823");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101819");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101812");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101830");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101820");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101814");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101817");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101815");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101813");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("General");
  script_dependencies("secpod_adobe_prdts_detect_macosx.nasl");
  script_mandatory_keys("Adobe/Reader/MacOSX/Version");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE )) exit(0);
readerVer = infos['version'];
InstallPath = infos['location'];

if(version_in_range(version:readerVer, test_version:"11.0", test_version2:"11.0.22"))
{
  report = report_fixed_ver(installed_version:readerVer, fixed_version:"11.0.23", install_path:InstallPath);
  security_message(data:report);
  exit(0);
}

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.692 Medium

EPSS

Percentile

98.0%