Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310832710
HistoryNov 17, 2023 - 12:00 a.m.

Adobe Reader Classic 2020 Security Update (APSB23-54) - Windows

2023-11-1700:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
4
adobe reader classic
security update
windows
arbitrary code execution
memory leak
vulnerabilities

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.029 Low

EPSS

Percentile

90.8%

Adobe Acrobat Reader Classic 2020 is prone
to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:adobe:acrobat_reader_dc_classic";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.832710");
  script_version("2023-11-24T16:09:32+0000");
  script_cve_id("CVE-2023-44336", "CVE-2023-44337", "CVE-2023-44338", "CVE-2023-44359",
                "CVE-2023-44365", "CVE-2023-44366", "CVE-2023-44367", "CVE-2023-44371",
                "CVE-2023-44372", "CVE-2023-44339", "CVE-2023-44340", "CVE-2023-44348",
                "CVE-2023-44356", "CVE-2023-44357", "CVE-2023-44358", "CVE-2023-44360",
                "CVE-2023-44361");
  script_tag(name:"cvss_base", value:"7.2");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2023-11-24 16:09:32 +0000 (Fri, 24 Nov 2023)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-11-22 16:58:00 +0000 (Wed, 22 Nov 2023)");
  script_tag(name:"creation_date", value:"2023-11-17 16:56:37 +0530 (Fri, 17 Nov 2023)");
  script_name("Adobe Reader Classic 2020 Security Update (APSB23-54) - Windows");

  script_tag(name:"summary", value:"Adobe Acrobat Reader Classic 2020 is prone
  to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to,

  - Multiple Use After Free errors.

  - Multiple Out-of-bounds Read errors.

  - An Access of Uninitialized Pointer.

  For more information about the vulnerabilities refer to Reference links.");

  script_tag(name:"impact", value:"Successful exploitation will allow attackers
  to execute arbitrary code and memory leak on an affected system.");

  script_tag(name:"affected", value:"Adobe Reader Classic 2020 version
  prior to 20.005.30539 on Windows.");

  script_tag(name:"solution", value:"Update to version 20.005.30539 or
  later.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"registry");
  script_xref(name:"URL", value:"https://helpx.adobe.com/security/products/acrobat/apsb23-54.html");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_adobe_acrobat_reader_dc_classic_detect_win.nasl");
  script_mandatory_keys("Adobe/Acrobat/ReaderDC/Classic/Win/Ver");
  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!infos = get_app_version_and_location(cpe:CPE, exit_no_version:TRUE)) exit(0);
vers = infos["version"];
path = infos["location"];

if(version_in_range(version:vers, test_version:"20.0", test_version2:"20.005.30524")) {
  report = report_fixed_ver(installed_version:vers, fixed_version:"20.005.30539", install_path:path);
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.029 Low

EPSS

Percentile

90.8%