Lucene search

K

Adobe Acrobat Reader 2017 Security Updates (APSB19-49) - Mac OS X

🗓️ 16 Oct 2019 00:00:00Reported by Copyright (C) 2019 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 30 Views

Adobe Acrobat Reader 2017 Security Updates (APSB19-49) - Mac OS X. Vulnerabilities including out-of-bounds errors, type confusion, and race conditions can allow information access and code execution

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
# SPDX-FileCopyrightText: 2019 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:adobe:acrobat_reader";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.815807");
  script_version("2024-02-12T05:05:32+0000");
  script_cve_id("CVE-2019-8064", "CVE-2019-8160", "CVE-2019-8161", "CVE-2019-8162",
                "CVE-2019-8163", "CVE-2019-8164", "CVE-2019-8165", "CVE-2019-8166",
                "CVE-2019-8167", "CVE-2019-8168", "CVE-2019-8169", "CVE-2019-8170",
                "CVE-2019-8171", "CVE-2019-8172", "CVE-2019-8173", "CVE-2019-8174",
                "CVE-2019-8175", "CVE-2019-8176", "CVE-2019-8177", "CVE-2019-8178",
                "CVE-2019-8179", "CVE-2019-8180", "CVE-2019-8181", "CVE-2019-8182",
                "CVE-2019-8183", "CVE-2019-8184", "CVE-2019-8185", "CVE-2019-8186",
                "CVE-2019-8187", "CVE-2019-8188", "CVE-2019-8189", "CVE-2019-8190",
                "CVE-2019-8191", "CVE-2019-8192", "CVE-2019-8193", "CVE-2019-8194",
                "CVE-2019-8195", "CVE-2019-8196", "CVE-2019-8197", "CVE-2019-8198",
                "CVE-2019-8199", "CVE-2019-8200", "CVE-2019-8201", "CVE-2019-8202",
                "CVE-2019-8203", "CVE-2019-8204", "CVE-2019-8205", "CVE-2019-8206",
                "CVE-2019-8207", "CVE-2019-8208", "CVE-2019-8209", "CVE-2019-8210",
                "CVE-2019-8211", "CVE-2019-8212", "CVE-2019-8213", "CVE-2019-8214",
                "CVE-2019-8215", "CVE-2019-8216", "CVE-2019-8217", "CVE-2019-8218",
                "CVE-2019-8219", "CVE-2019-8220", "CVE-2019-8221", "CVE-2019-8222",
                "CVE-2019-8223", "CVE-2019-8224", "CVE-2019-8225", "CVE-2019-8226");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-12 05:05:32 +0000 (Mon, 12 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2019-10-22 15:15:00 +0000 (Tue, 22 Oct 2019)");
  script_tag(name:"creation_date", value:"2019-10-16 12:02:40 +0530 (Wed, 16 Oct 2019)");
  script_name("Adobe Acrobat Reader 2017 Security Updates (APSB19-49) - Mac OS X");

  script_tag(name:"summary", value:"Adobe Acrobat Reader 2017 is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to:

  - Multiple out-of-bounds read errors.

  - Multiple out-of-bounds write errors.

  - Multiple type confusion errors.

  - Multiple use after free errors.

  - Multiple heap overflow errors.

  - A buffer overrun error.

  - A cross site scripting error.

  - A race condition error.

  - An incomplete implementation of security mechanism.

  - An untrusted pointer dereference error.");

  script_tag(name:"impact", value:"Successful exploitation will allow an attacker
  to gain access to sensitive information and run arbitrary code in context of
  current user.");

  script_tag(name:"affected", value:"Adobe Acrobat Reader versions 2017.011.30148
  and earlier on Mac OS X.");

  script_tag(name:"solution", value:"Upgrade to Adobe Acrobat Reader 2017 version
  2017.011.30150 or later. Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");
  script_xref(name:"URL", value:"https://helpx.adobe.com/security/products/acrobat/apsb19-49.html");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2019 Greenbone AG");
  script_family("General");
  script_dependencies("secpod_adobe_prdts_detect_macosx.nasl");
  script_mandatory_keys("Adobe/Reader/MacOSX/Version");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))
  exit(0);

vers = infos['version'];
path = infos['location'];

## 2017.011.30148 == 17.011.30148
if(version_in_range(version:vers, test_version:"17.0", test_version2:"17.011.30148")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"17.011.30150 (2017.011.30150)", install_path:path);
  security_message(data:report);
  exit(0);
}

exit(99);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
16 Oct 2019 00:00Current
7.4High risk
Vulners AI Score7.4
CVSS210
CVSS39.8
EPSS0.46277
30
.json
Report