Lucene search

K

Adobe Reader 2017 Security Update (APSB20-05) - Mac OS X

πŸ—“οΈΒ 13 Feb 2020Β 00:00:00Reported byΒ Copyright (C) 2020 Greenbone Networks GmbHTypeΒ 
openvas
Β openvas
πŸ”—Β plugins.openvas.orgπŸ‘Β 27Β Views

Adobe Reader 2017 Security Update for Mac OS X, fixing multiple vulnerabilities, including remote code execution and privilege escalation

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
# Copyright (C) 2020 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

CPE = "cpe:/a:adobe:acrobat_reader";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.816570");
  script_version("2021-10-05T11:36:17+0000");
  script_cve_id("CVE-2020-3744", "CVE-2020-3747", "CVE-2020-3755", "CVE-2020-3742",
                "CVE-2020-3752", "CVE-2020-3754", "CVE-2020-3743", "CVE-2020-3745",
                "CVE-2020-3746", "CVE-2020-3748", "CVE-2020-3749", "CVE-2020-3750",
                "CVE-2020-3751", "CVE-2020-3753", "CVE-2020-3756", "CVE-2020-3762",
                "CVE-2020-3763");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2021-10-05 11:36:17 +0000 (Tue, 05 Oct 2021)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2020-02-26 20:27:00 +0000 (Wed, 26 Feb 2020)");
  script_tag(name:"creation_date", value:"2020-02-13 11:18:45 +0530 (Thu, 13 Feb 2020)");
  script_name("Adobe Reader 2017 Security Update (APSB20-05) - Mac OS X");

  script_tag(name:"summary", value:"Adobe Reader 2017 is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to following
  errors,

  - An out-of-bounds read.

  - Heap overflow.

  - Buffer Error.

  - Use After Free.

  - Stack exhaustion.

  - Privilege Escalation.");

  script_tag(name:"impact", value:"Successful exploitation will allow remote
  attackers to gain access to sensitive data, execute arbitrary code, gain
  privileged access and memory leak condition.");

  script_tag(name:"affected", value:"Adobe Reader 2017 prior to version
  2017.011.30158.");

  script_tag(name:"solution", value:"Update to Adobe Reader 2017 version
  2017.011.30158 or later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"executable_version");
  script_xref(name:"URL", value:"https://helpx.adobe.com/security/products/acrobat/apsb20-05.html");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
  script_family("General");
  script_dependencies("secpod_adobe_prdts_detect_macosx.nasl");
  script_mandatory_keys("Adobe/Reader/MacOSX/Version");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE))
  exit(0);

vers = infos["version"];
path = infos["location"];

if(version_in_range(version:vers, test_version:"17.0", test_version2:"17.011.30157")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"17.011.30157 (2017.011.30158)", install_path:path);
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
13 Feb 2020 00:00Current
8.8High risk
Vulners AI Score8.8
CVSS210
CVSS39.8
EPSS0.19531
27
.json
Report