Lucene search

K
openvasCopyright (C) 2018 Greenbone AGOPENVAS:1361412562310812962
HistoryMar 06, 2018 - 12:00 a.m.

Adobe Acrobat 2017 Multiple Vulnerabilities (APSB17-36) - Mac OS X

2018-03-0600:00:00
Copyright (C) 2018 Greenbone AG
plugins.openvas.org
13

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.692 Medium

EPSS

Percentile

98.0%

Adobe Acrobat 2017 is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2018 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:adobe:acrobat";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.812962");
  script_version("2024-02-12T14:37:47+0000");
  script_cve_id("CVE-2017-16377", "CVE-2017-16378", "CVE-2017-16360", "CVE-2017-16388",
                "CVE-2017-16389", "CVE-2017-16390", "CVE-2017-16393", "CVE-2017-16398",
                "CVE-2017-16381", "CVE-2017-16385", "CVE-2017-16392", "CVE-2017-16395",
                "CVE-2017-16396", "CVE-2017-16363", "CVE-2017-16365", "CVE-2017-16374",
                "CVE-2017-16384", "CVE-2017-16386", "CVE-2017-16387", "CVE-2017-16368",
                "CVE-2017-16383", "CVE-2017-16391", "CVE-2017-16410", "CVE-2017-16362",
                "CVE-2017-16370", "CVE-2017-16376", "CVE-2017-16382", "CVE-2017-16394",
                "CVE-2017-16397", "CVE-2017-16399", "CVE-2017-16400", "CVE-2017-16401",
                "CVE-2017-16402", "CVE-2017-16403", "CVE-2017-16404", "CVE-2017-16405",
                "CVE-2017-16408", "CVE-2017-16409", "CVE-2017-16412", "CVE-2017-16414",
                "CVE-2017-16417", "CVE-2017-16418", "CVE-2017-16420", "CVE-2017-11293",
                "CVE-2017-16407", "CVE-2017-16413", "CVE-2017-16415", "CVE-2017-16416",
                "CVE-2017-16361", "CVE-2017-16366", "CVE-2017-16369", "CVE-2017-16380",
                "CVE-2017-16419", "CVE-2017-16367", "CVE-2017-16379", "CVE-2017-16406",
                "CVE-2017-16364", "CVE-2017-16371", "CVE-2017-16372", "CVE-2017-16373",
                "CVE-2017-16375", "CVE-2017-16411", "CVE-2017-11307", "CVE-2017-11308",
                "CVE-2017-11240", "CVE-2017-11250", "CVE-2017-11306", "CVE-2017-11253");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-12 14:37:47 +0000 (Mon, 12 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2017-12-22 19:56:00 +0000 (Fri, 22 Dec 2017)");
  script_tag(name:"creation_date", value:"2018-03-06 12:03:30 +0530 (Tue, 06 Mar 2018)");
  script_name("Adobe Acrobat 2017 Multiple Vulnerabilities (APSB17-36) - Mac OS X");

  script_tag(name:"summary", value:"Adobe Acrobat 2017 is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to:

  - Two access of uninitialized point vulnerabilities that could result in
    remote could execution,

  - Six use after free vulnerabilities that could result in remote code execution.

  - Five buffer access with incorrect length value vulnerabilities that could
    result in remote code execution.

  - Six buffer over-read vulnerabilities that could result in remote code
    execution.

  - A buffer overflow vulnerability that could result in remote code execution.

  - A heap overflow vulnerability that could result in remote code execution.

  - Two improper validation of array index vulnerabilities that could result
    in remote code execution.

  - Multiple out-of-bounds read vulnerabilities that could result in remote code
    execution.

  - Four out-of-bounds write vulnerabilities that could result in remote code
    execution.

  - Two security bypass vulnerabilities that could result in drive-by-downloads.

  - A security bypass vulnerability that could result in information disclosure.

  - A security bypass vulnerability that could result in remote code execution.

  - A stack exhaustion vulnerability that could result in excessive resource
    consumption.

  - Three type confusion vulnerabilities that could result in remote code
    execution.

  - Six untrusted pointer dereference vulnerabilities that could result in remote
    code execution.

  Please see the references for more information on the vulnerabilities.");

  script_tag(name:"impact", value:"Successful exploitation will allow remote
  attackers to execute arbitrary code in the context of the application.
  Failed attacks may cause a denial-of-service condition. Also attackers will be
  able to gain access to potentially sensitive information, get excessive resource
  consumption and get unintentional download of malicious software.");

  script_tag(name:"affected", value:"Adobe Acrobat 2017.011.30066 and earlier
  versions on Mac OS X.");

  script_tag(name:"solution", value:"Upgrade to Adobe Acrobat 2017 version
  2017.011.30068 or later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");
  script_xref(name:"URL", value:"https://helpx.adobe.com/security/products/acrobat/apsb17-36.html");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101821");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101818");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101831");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101824");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101816");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101823");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101819");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101812");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101830");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101820");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101814");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101817");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101815");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/101813");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2018 Greenbone AG");
  script_family("General");
  script_dependencies("secpod_adobe_prdts_detect_macosx.nasl");
  script_mandatory_keys("Adobe/Acrobat/MacOSX/Version");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))
  exit(0);

vers = infos['version'];
path = infos['location'];

##2017.011.30068 == 17.011.30068
if(version_in_range(version:vers, test_version:"17.0", test_version2:"17.011.30067")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"17.011.30068 (2017.011.30068)", install_path:path);
  security_message(data:report);
  exit(0);
}

exit(99);

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.692 Medium

EPSS

Percentile

98.0%