{"cve": [{"lastseen": "2020-12-09T19:26:03", "description": "CRLF injection vulnerability in Adobe Acrobat Reader Plugin before 8.0.0, when used with the Microsoft.XMLHTTP ActiveX object in Internet Explorer, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the javascript: URI in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.", "edition": 5, "cvss3": {}, "published": "2007-01-03T21:28:00", "title": "CVE-2007-0047", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": true, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2007-0047"], "modified": "2017-07-29T01:29:00", "cpe": ["cpe:/a:adobe:acrobat_reader:7.0.8"], "id": "CVE-2007-0047", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2007-0047", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*"]}], "openvas": [{"lastseen": "2020-04-22T17:03:56", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0046"], "description": "This host is installed with Adobe Reader and is prone to multiple\nvulnerabilities.", "modified": "2020-04-20T00:00:00", "published": "2014-04-11T00:00:00", "id": "OPENVAS:1361412562310804392", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804392", "type": "openvas", "title": "Adobe Reader Multiple Vulnerabilities Jan07 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Reader Multiple Vulnerabilities Jan07 (Windows)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804392\");\n script_version(\"2020-04-20T13:31:49+0000\");\n script_cve_id(\"CVE-2006-5857\", \"CVE-2007-0046\", \"CVE-2007-0047\", \"CVE-2007-0044\");\n script_bugtraq_id(21858, 21981);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-04-11 17:14:20 +0530 (Fri, 11 Apr 2014)\");\n script_name(\"Adobe Reader Multiple Vulnerabilities Jan07 (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Reader and is prone to multiple\nvulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Flaws exist due to,\n\n - Input passed to a hosted PDF file is not properly sanitised by the browser\nplug-in before being returned to users.\n\n - Input passed to a hosted PDF file is not properly handled by the browser\nplug-in.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to cause memory corruption,\nexecution of arbitrary code, execution of arbitrary script code in a user's\nbrowser session in context of an affected site and conduct Cross Site Request\nForgery attacks.\");\n script_tag(name:\"affected\", value:\"Adobe Reader version 7.0.8 and prior on Windows.\");\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Reader version 7.0.9 or later.\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/23483\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/31266\");\n script_xref(name:\"URL\", value:\"http://www.adobe.com/support/security/bulletins/apsb07-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Reader/Win/Installed\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/reader\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!readerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(readerVer)\n{\n if(version_is_less_equal(version:readerVer, test_version:\"7.0.8\"))\n {\n report = report_fixed_ver(installed_version:readerVer, vulnerable_range:\"Less than or equal to 7.0.8\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-22T17:03:50", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0046"], "description": "This host is installed with Adobe Reader and is prone to multiple\nvulnerabilities.", "modified": "2020-04-20T00:00:00", "published": "2014-04-11T00:00:00", "id": "OPENVAS:1361412562310804394", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804394", "type": "openvas", "title": "Adobe Reader Multiple Vulnerabilities Jan07 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Reader Multiple Vulnerabilities Jan07 (Linux)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804394\");\n script_version(\"2020-04-20T13:31:49+0000\");\n script_cve_id(\"CVE-2006-5857\", \"CVE-2007-0046\", \"CVE-2007-0047\", \"CVE-2007-0044\");\n script_bugtraq_id(21858, 21981);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-04-11 18:00:34 +0530 (Fri, 11 Apr 2014)\");\n script_name(\"Adobe Reader Multiple Vulnerabilities Jan07 (Linux)\");\n\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Reader and is prone to multiple\nvulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Flaws exist due to,\n\n - Input passed to a hosted PDF file is not properly sanitised by the browser\nplug-in before being returned to users.\n\n - Input passed to a hosted PDF file is not properly handled by the browser\nplug-in.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to cause memory corruption,\nexecution of arbitrary code, execution of arbitrary script code in a user's\nbrowser session in context of an affected site and conduct cross site request\nforgery attacks.\");\n script_tag(name:\"affected\", value:\"Adobe Reader version 7.0.8 and prior on Linux.\");\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Reader version 7.0.9 or later.\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/23483\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/31266\");\n script_xref(name:\"URL\", value:\"http://www.adobe.com/support/security/bulletins/apsb07-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_prdts_detect_lin.nasl\");\n script_mandatory_keys(\"Adobe/Reader/Linux/Version\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/reader\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!readerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(readerVer)\n{\n if(version_is_less_equal(version:readerVer, test_version:\"7.0.8\"))\n {\n report = report_fixed_ver(installed_version:readerVer, vulnerable_range:\"Less than or equal to 7.0.8\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-04-22T17:03:45", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0046"], "description": "This host is installed with Adobe Reader and is prone to multiple\nvulnerabilities.", "modified": "2020-04-20T00:00:00", "published": "2014-04-11T00:00:00", "id": "OPENVAS:1361412562310804393", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310804393", "type": "openvas", "title": "Adobe Reader Multiple Vulnerabilities Jan07 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Reader Multiple Vulnerabilities Jan07 (Mac OS X)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2014 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.804393\");\n script_version(\"2020-04-20T13:31:49+0000\");\n script_cve_id(\"CVE-2006-5857\", \"CVE-2007-0046\", \"CVE-2007-0047\", \"CVE-2007-0044\");\n script_bugtraq_id(21858, 21981);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-04-20 13:31:49 +0000 (Mon, 20 Apr 2020)\");\n script_tag(name:\"creation_date\", value:\"2014-04-11 18:00:34 +0530 (Fri, 11 Apr 2014)\");\n script_name(\"Adobe Reader Multiple Vulnerabilities Jan07 (Mac OS X)\");\n\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Reader and is prone to multiple\nvulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Flaws exist due to,\n\n - Input passed to a hosted PDF file is not properly sanitised by the browser\nplug-in before being returned to users.\n\n - Input passed to a hosted PDF file is not properly handled by the browser\nplug-in.\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to cause memory corruption,\nexecution of arbitrary code, execution of arbitrary script code in a user's\nbrowser session in context of an affected site and conduct cross site request\nforgery attacks.\");\n script_tag(name:\"affected\", value:\"Adobe Reader version 7.0.8 and prior on Mac OS X.\");\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Reader version 7.0.9 or later.\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/23483\");\n script_xref(name:\"URL\", value:\"http://xforce.iss.net/xforce/xfdb/31266\");\n script_xref(name:\"URL\", value:\"http://www.adobe.com/support/security/bulletins/apsb07-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2014 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Reader/MacOSX/Version\");\n script_xref(name:\"URL\", value:\"http://get.adobe.com/reader\");\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!readerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(readerVer)\n{\n if(version_is_less_equal(version:readerVer, test_version:\"7.0.8\"))\n {\n report = report_fixed_ver(installed_version:readerVer, vulnerable_range:\"Less than or equal to 7.0.8\");\n security_message(port:0, data:report);\n exit(0);\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2017-07-26T08:56:03", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n acroread\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5018489 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2017-07-11T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:65588", "href": "http://plugins.openvas.org/nasl.php?oid=65588", "type": "openvas", "title": "SLES9: Security update for acroread", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5018489.nasl 6666 2017-07-11 13:13:36Z cfischer $\n# Description: Security update for acroread\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n acroread\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5018489 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_id(65588);\n script_version(\"$Revision: 6666 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-11 15:13:36 +0200 (Tue, 11 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2006-5857\", \"CVE-2007-0044\", \"CVE-2007-0045\", \"CVE-2007-0046\", \"CVE-2007-0047\", \"CVE-2007-0048\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES9: Security update for acroread\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"acroread\", rpm:\"acroread~7.0.9~2.5\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2017-12-12T11:20:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "description": "Check for the Version of acroread", "modified": "2017-12-08T00:00:00", "published": "2009-01-28T00:00:00", "id": "OPENVAS:850062", "href": "http://plugins.openvas.org/nasl.php?oid=850062", "type": "openvas", "title": "SuSE Update for acroread SUSE-SA:2007:011", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_suse_2007_011.nasl 8050 2017-12-08 09:34:29Z santu $\n#\n# SuSE Update for acroread SUSE-SA:2007:011\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The Adobe Acrobat Reader has been updated to version 7.0.9.\n\n This update also includes following security fixes:\n\n CVE-2006-5857: A memory corruption problem was fixed in Adobe Acrobat\n Reader can potentially lead to code execution.\n\n CVE-2007-0044: Universal Cross Site Request Forgery (CSRF) problems\n were fixed in the Acrobat Reader plugin which could be\n exploited by remote attackers to conduct CSRF attacks\n using any site that is providing PDFs.\n\n CVE-2007-0045: Cross site scripting problems in the Acrobat Reader\n plugin were fixed, which could be exploited by remote\n attackers to conduct XSS attacks against any site that\n is providing PDFs.\n\n CVE-2007-0046: A double free problem in the Acrobat Reader plugin was fixed\n which could be used by remote attackers to potentially execute\n arbitrary code.\n Note that all platforms using Adobe Reader currently have\n counter measures against such attack where it will just\n cause a controlled abort().\n\n CVE-2007-0048 affect only Microsoft Windows and\n Internet Explorer.\n\n Please note that the Acrobat Reader on SUSE Linux Enterprise Server\n 9 is affected too, but can not be updated currently due to GTK+\n 2.4 requirements. We are trying to find a solution.\n\n Acrobat Reader on SUSE Linux Enterprise Server 8 and SUSE Linux\n Desktop 1 is no longer supported and should be deinstalled.\";\n\ntag_impact = \"remote code execution\";\ntag_affected = \"acroread on SUSE LINUX 10.1, openSUSE 10.2, Novell Linux Desktop 9, SUSE SLED 10\";\ntag_solution = \"Please Install the Updated Packages.\";\n\n\n\nif(description)\n{\n script_id(850062);\n script_version(\"$Revision: 8050 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-12-08 10:34:29 +0100 (Fri, 08 Dec 2017) $\");\n script_tag(name:\"creation_date\", value:\"2009-01-28 13:40:10 +0100 (Wed, 28 Jan 2009)\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_xref(name: \"SUSE-SA\", value: \"2007-011\");\n script_cve_id(\"CVE-2006-5857\", \"CVE-2007-0044\", \"CVE-2007-0045\", \"CVE-2007-0046\", \"CVE-2007-0047\", \"CVE-2007-0048\");\n script_name( \"SuSE Update for acroread SUSE-SA:2007:011\");\n\n script_summary(\"Check for the Version of acroread\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2009 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = get_kb_item(\"ssh/login/release\");\n\n\nres = \"\";\nif(release == NULL){\n exit(0);\n}\n\nif(release == \"SLED10\")\n{\n\n if ((res = isrpmvuln(pkg:\"acroread\", rpm:\"acroread~7.0.9~1.2\", rls:\"SLED10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"openSUSE10.2\")\n{\n\n if ((res = isrpmvuln(pkg:\"acroread\", rpm:\"acroread~7.0.9~2.1\", rls:\"openSUSE10.2\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"NLDk9\")\n{\n\n if ((res = isrpmvuln(pkg:\"acroread\", rpm:\"acroread~7.0.9~2.1\", rls:\"NLDk9\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n\n\nif(release == \"SL10.1\")\n{\n\n if ((res = isrpmvuln(pkg:\"acroread\", rpm:\"acroread~7.0.9~1.2\", rls:\"SL10.1\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99); # Not vulnerable.\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-04-06T11:39:48", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "description": "The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n acroread\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5018489 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/", "modified": "2018-04-06T00:00:00", "published": "2009-10-10T00:00:00", "id": "OPENVAS:136141256231065588", "href": "http://plugins.openvas.org/nasl.php?oid=136141256231065588", "type": "openvas", "title": "SLES9: Security update for acroread", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: sles9p5018489.nasl 9350 2018-04-06 07:03:33Z cfischer $\n# Description: Security update for acroread\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# or at your option, GNU General Public License version 3,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_summary = \"The remote host is missing updates to packages that affect\nthe security of your system. One or more of the following packages\nare affected:\n\n acroread\n\nFor more information, please visit the referenced security\nadvisories.\n\nMore details may also be found by searching for keyword\n5018489 within the SuSE Enterprise Server 9 patch\ndatabase at http://download.novell.com/patch/finder/\";\n\ntag_solution = \"Please install the updates provided by SuSE.\";\n \nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.65588\");\n script_version(\"$Revision: 9350 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-04-06 09:03:33 +0200 (Fri, 06 Apr 2018) $\");\n script_tag(name:\"creation_date\", value:\"2009-10-10 16:11:46 +0200 (Sat, 10 Oct 2009)\");\n script_cve_id(\"CVE-2006-5857\", \"CVE-2007-0044\", \"CVE-2007-0045\", \"CVE-2007-0046\", \"CVE-2007-0047\", \"CVE-2007-0048\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"SLES9: Security update for acroread\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse_sles\", \"ssh/login/rpms\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-rpm.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isrpmvuln(pkg:\"acroread\", rpm:\"acroread~7.0.9~2.5\", rls:\"SLES9.0\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "kaspersky": [{"lastseen": "2020-09-02T11:45:07", "bulletinFamily": "info", "cvelist": ["CVE-2006-5857", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "description": "### *Detect date*:\n01/09/2007\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Adobe Acrobat & Reader. Malicious users can exploit these vulnerabilities to cause denial of service or remotely execute arbitrary code. Below is a complete list of vulnerabilities:\n\n### *Affected products*:\nAdobe Acrobat versions 7.0.8 and earlier \nAdobe Reader versions 7.0.8 and earlier\n\n### *Solution*:\nUpdate to latest version \n[Reader](<http://get.adobe.com/reader/>)\n\n### *Original advisories*:\n[Adobe Bulletin](<http://www.adobe.com/support/security/bulletins/apsb07-01.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Reader](<https://threats.kaspersky.com/en/product/Adobe-Reader/>)\n\n### *CVE-IDS*:\n[CVE-2006-5857](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5857>)9.3Critical \n[CVE-2007-0048](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0048>)5.0Critical \n[CVE-2007-0047](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0047>)6.8High \n[CVE-2007-0046](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0046>)7.5Critical \n[CVE-2007-0045](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0045>)4.3Warning", "edition": 42, "modified": "2020-05-22T00:00:00", "published": "2007-01-09T00:00:00", "id": "KLA10032", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10032", "title": "\r KLA10032Multiple vulnerabilities in Adobe Acrobat & Reader ", "type": "kaspersky", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-01T01:14:22", "description": "The version of Adobe PDF Plug-In installed on the remote host is\nearlier than 8.0 / 7.0.9 / 6.0.6 and reportedly fails to properly\nsanitize input to the 'FDF', 'XML', or 'XFDF' fields used by its 'Open\nParameters' feature. By tricking a user into accessing a specially\ncrafted link and depending on the browser with which the plugin is\nused, a remote attacker may be able to leverage these issues to\nconduct arbitrary code execution, denial of service, cross-site script\nforgery, or cross-site scripting attacks against a user on the remote\nhost.", "edition": 25, "published": "2007-01-05T00:00:00", "title": "Adobe PDF Plug-In < 8.0 / 7.0.9 / 6.0.6 Multiple Vulnerabilities (APSB07-01)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat", "cpe:/a:adobe:acrobat_reader"], "id": "ADOBE_PDF_PLUGIN_80.NASL", "href": "https://www.tenable.com/plugins/nessus/23975", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(23975);\n script_version(\"1.21\");\n script_cvs_date(\"Date: 2018/11/15 20:50:26\");\n\n script_cve_id(\n \"CVE-2007-0044\",\n \"CVE-2007-0045\",\n \"CVE-2007-0046\",\n \"CVE-2007-0047\",\n \"CVE-2007-0048\"\n );\n script_bugtraq_id(21858);\n script_xref(name:\"CERT\", value:\"815960\");\n\n script_name(english:\"Adobe PDF Plug-In < 8.0 / 7.0.9 / 6.0.6 Multiple Vulnerabilities (APSB07-01)\");\n script_summary(english:\"Checks version of nppdf32.dll\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The browser plugin on the remote Windows host is affected by multiple\nissues.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe PDF Plug-In installed on the remote host is\nearlier than 8.0 / 7.0.9 / 6.0.6 and reportedly fails to properly\nsanitize input to the 'FDF', 'XML', or 'XFDF' fields used by its 'Open\nParameters' feature. By tricking a user into accessing a specially\ncrafted link and depending on the browser with which the plugin is\nused, a remote attacker may be able to leverage these issues to\nconduct arbitrary code execution, denial of service, cross-site script\nforgery, or cross-site scripting attacks against a user on the remote\nhost.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.wisec.it/vulns.php?page=9\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.securityfocus.com/archive/1/455801/30/0/threaded\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.adobe.com/support/security/advisories/apsa07-01.html\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.adobe.com/support/security/bulletins/apsb07-01.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Either disable displaying of PDF documents in web browsers or upgrade\nto Adobe Reader / Acrobat 8.0 / 7.0.9 / 6.0.6 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_cwe_id(352);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2006/12/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/01/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/01/05\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_set_attribute(attribute:\"cpe\",value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n script_copyright(english:\"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"smb_hotfixes.nasl\", \"opera_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\");\n script_require_ports(139, 445);\n exit(0);\n}\n\n#\n\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"audit.inc\");\n\nif (!get_kb_item(\"SMB/Registry/Enumerated\")) exit(0);\n\n\n# Connect to the appropriate share.\nname = kb_smb_name();\nport = kb_smb_transport();\n#if (!get_port_state(port)) exit(0);\nlogin = kb_smb_login();\npass = kb_smb_password();\ndomain = kb_smb_domain();\n\n#soc = open_sock_tcp(port);\n#if (!soc) exit(0);\n\n#session_init(socket:soc, hostname:name);\n\nif(!smb_session_init()) audit(AUDIT_FN_FAIL, 'smb_session_init');\n\n\nrc = NetUseAdd(login:login, password:pass, domain:domain, share:\"IPC$\");\nif (rc != 1) {\n NetUseDel();\n exit(0);\n}\n\n\n# Connect to remote registry.\nhklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);\nif (isnull(hklm))\n{\n NetUseDel();\n exit(0);\n}\n\n\n# Determine possible installation paths.\npaths = make_array();\n# - Adobe itself.\nkey = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\App Paths\\AcroRd32.exe\";\nkey_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);\nif (!isnull(key_h))\n{\n value = RegQueryValue(handle:key_h, item:\"Path\");\n if (!isnull(value))\n {\n paths[\"Adobe\"] = string(value[1], \"Browser\");\n }\n RegCloseKey(handle:key_h);\n}\n# - Internet Explorer.\nkey = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\App Paths\\IEXPLORE.EXE\";\nkey_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);\nif (!isnull(key_h))\n{\n value = RegQueryValue(handle:key_h, item:\"Path\");\n if (!isnull(value))\n {\n path = ereg_replace(pattern:\"^(.+);$\", replace:\"\\1\", string:value[1]);\n paths[\"Internet Explorer\"] = string(path, \"\\\\PLUGINS\");\n }\n RegCloseKey(handle:key_h);\n}\n# - Firefox.\nkey = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\App Paths\\firefox.exe\";\nkey_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);\nif (!isnull(key_h))\n{\n value = RegQueryValue(handle:key_h, item:\"Path\");\n if (!isnull(value))\n {\n paths[\"Firefox\"] = string(value[1], \"plugins\");\n }\n RegCloseKey(handle:key_h);\n}\n# - Opera\npath = get_kb_item(\"SMB/Opera/Path\");\nif (!isnull(path))\n{\n # nb: Opera seems to look in a variety of places for its plugins.\n paths[\"Opera1\"] = string(path, \"\\\\program\\\\plugins\");\n if (paths[\"Firefox\"]) paths[\"Opera2\"] = paths[\"Firefox\"];\n if (paths[\"Adobe\"]) paths[\"Opera3\"] = paths[\"Adobe\"];\n}\nRegCloseKey(handle:hklm);\n\n\n# Check the file version for each possible install path.\ninfo = \"\";\nfound_opera_plugin = 0;\nforeach browser (sort(keys(paths)))\n{\n # Determine whether to check some browsers.\n if (\n (browser == \"Adobe\" && report_paranoia < 2) ||\n (browser =~ \"Opera[23]\" && found_opera_plugin == 1)\n ) check = 0;\n else check = 1;\n\n if (check)\n {\n # Determine its version from the executable itself.\n path = paths[browser];\n share = ereg_replace(pattern:\"^([A-Za-z]):.*\", replace:\"\\1$\", string:path);\n dll = ereg_replace(pattern:\"^[A-Za-z]:(.*)\", replace:\"\\1\\nppdf32.dll\", string:path);\n NetUseDel(close:FALSE);\n\n rc = NetUseAdd(login:login, password:pass, domain:domain, share:share);\n if (rc != 1)\n {\n NetUseDel();\n exit(1);\n }\n\n fh = CreateFile(\n file:dll,\n desired_access:GENERIC_READ,\n file_attributes:FILE_ATTRIBUTE_NORMAL,\n share_mode:FILE_SHARE_READ,\n create_disposition:OPEN_EXISTING\n );\n\n if (!isnull(fh))\n {\n if (\"Opera\" >< browser) found_opera_plugin = 1;\n\n ver = GetFileVersion(handle:fh);\n CloseFile(handle:fh);\n\n # Check the version\n if (\n !isnull(ver) &&\n (\n ver[0] < 6 ||\n (ver[0] == 6 && ver[1] == 0 && ver[2] < 6) ||\n (ver[0] == 7 && ver[1] == 0 && ver[2] < 9)\n )\n )\n {\n version = string(ver[0], \".\", ver[1], \".\", ver[2], \".\", ver[3]);\n if (browser == \"Adobe\")\n info += strcat(\n ' - Version ', version, ' of the plugin itself is located in\\n',\n \" '\", path, \"'.\", '\\n'\n );\n else\n {\n if (\"Opera\" >< browser) browser = \"Opera\";\n info += strcat(\n ' - Version ', version, ' of the plugin is installed in ', browser, '\\n',\n \" under '\", path, \"'.\", '\\n'\n );\n }\n }\n }\n }\n}\n\n\nif (info)\n{\n security_hole(port:port, extra:info);\n}\n\n\n# Clean up.\nNetUseDel();\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T14:42:53", "description": "The Adobe Acrobat Reader has been updated to version 7.0.9.\n\nThis update also includes following security fixes :\n\nCVE-2006-5857: A memory corruption problem was fixed in Adobe Acrobat\nReader can potentially lead to code execution.\n\nCVE-2007-0044: Universal Cross Site Request Forgery (CSRF) problems\nwere fixed in the Acrobat Reader plugin which could be exploited by\nremote attackers to conduct CSRF attacks using any site that is\nproviding PDFs.\n\nCVE-2007-0045: Cross site scripting problems in the Acrobat Reader\nplugin were fixed, which could be exploited by remote attackers to\nconduct XSS attacks against any site that is providing PDFs.\n\nCVE-2007-0046: A double free problem in the Acrobat Reader plugin was\nfixed which could be used by remote attackers to potentially execute\narbitrary code. Note that all platforms using Adobe Reader currently\nhave counter measures against such attack where it will just cause a\ncontrolled abort().\n\nCVE-2007-0047 and CVE-2007-0048 affect only Microsoft Windows and\nInternet Explorer.", "edition": 25, "published": "2007-10-17T00:00:00", "title": "openSUSE 10 Security Update : acroread (acroread-2506)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "modified": "2007-10-17T00:00:00", "cpe": ["cpe:/o:novell:opensuse:10.2", "p-cpe:/a:novell:opensuse:acroread", "cpe:/o:novell:opensuse:10.1"], "id": "SUSE_ACROREAD-2506.NASL", "href": "https://www.tenable.com/plugins/nessus/27144", "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update acroread-2506.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(27144);\n script_version(\"1.21\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-5857\", \"CVE-2007-0044\", \"CVE-2007-0045\", \"CVE-2007-0046\", \"CVE-2007-0047\", \"CVE-2007-0048\");\n\n script_name(english:\"openSUSE 10 Security Update : acroread (acroread-2506)\");\n script_summary(english:\"Check for the acroread-2506 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Adobe Acrobat Reader has been updated to version 7.0.9.\n\nThis update also includes following security fixes :\n\nCVE-2006-5857: A memory corruption problem was fixed in Adobe Acrobat\nReader can potentially lead to code execution.\n\nCVE-2007-0044: Universal Cross Site Request Forgery (CSRF) problems\nwere fixed in the Acrobat Reader plugin which could be exploited by\nremote attackers to conduct CSRF attacks using any site that is\nproviding PDFs.\n\nCVE-2007-0045: Cross site scripting problems in the Acrobat Reader\nplugin were fixed, which could be exploited by remote attackers to\nconduct XSS attacks against any site that is providing PDFs.\n\nCVE-2007-0046: A double free problem in the Acrobat Reader plugin was\nfixed which could be used by remote attackers to potentially execute\narbitrary code. Note that all platforms using Adobe Reader currently\nhave counter measures against such attack where it will just cause a\ncontrolled abort().\n\nCVE-2007-0047 and CVE-2007-0048 affect only Microsoft Windows and\nInternet Explorer.\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected acroread package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(352, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:acroread\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:10.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/01/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2007/10/17\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2007-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE10\\.1|SUSE10\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"10.1 / 10.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE10.1\", reference:\"acroread-7.0.9-1.2\") ) flag++;\nif ( rpm_check(release:\"SUSE10.2\", reference:\"acroread-7.0.9-2.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"acroread\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-17T14:02:12", "description": "The Adobe Acrobat Reader has been updated to version 7.0.9.\n\nFor SUSE Linux Enterprise Server 9 this version now includes its own\nGLIB2, ATK, PANGO and GTK2 libraries, since Acroread 7.0.x requires a\nminimum level of GTK2 2.4.\n\nThis update also includes following security fixes :\n\n - A memory corruption problem was fixed in Adobe Acrobat\n Reader can potentially lead to code execution.\n (CVE-2006-5857)\n\n - Universal cross-site request forgery (CSRF) problems\n were fixed in the Acrobat Reader plugin which could be\n exploited by remote attackers to conduct CSRF attacks\n using any site that is providing PDFs. (CVE-2007-0044)\n\n - Cross-site scripting problems in the Acrobat Reader\n plugin were fixed, which could be exploited by remote\n attackers to conduct XSS attacks against any site that\n is providing PDFs. (CVE-2007-0045)\n\n - A double free problem in the Acrobat Reader plugin was\n fixed which could be used by remote attackers to\n potentially execute arbitrary code. Note that all\n platforms using Adobe Reader currently have counter\n measures against such attack where it will just cause a\n controlled abort(). (CVE-2007-0046)\n\n - CVE-2007-0047 and CVE-2007-0048 affect only Microsoft\n Windows and Internet Explorer.", "edition": 25, "published": "2009-09-24T00:00:00", "title": "SuSE9 Security Update : acroread (YOU Patch Number 11433)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "modified": "2009-09-24T00:00:00", "cpe": ["cpe:/o:suse:suse_linux"], "id": "SUSE9_11433.NASL", "href": "https://www.tenable.com/plugins/nessus/41117", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The text description of this plugin is (C) Novell, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(41117);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\"CVE-2006-5857\", \"CVE-2007-0044\", \"CVE-2007-0045\", \"CVE-2007-0046\");\n\n script_name(english:\"SuSE9 Security Update : acroread (YOU Patch Number 11433)\");\n script_summary(english:\"Checks rpm output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SuSE 9 host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The Adobe Acrobat Reader has been updated to version 7.0.9.\n\nFor SUSE Linux Enterprise Server 9 this version now includes its own\nGLIB2, ATK, PANGO and GTK2 libraries, since Acroread 7.0.x requires a\nminimum level of GTK2 2.4.\n\nThis update also includes following security fixes :\n\n - A memory corruption problem was fixed in Adobe Acrobat\n Reader can potentially lead to code execution.\n (CVE-2006-5857)\n\n - Universal cross-site request forgery (CSRF) problems\n were fixed in the Acrobat Reader plugin which could be\n exploited by remote attackers to conduct CSRF attacks\n using any site that is providing PDFs. (CVE-2007-0044)\n\n - Cross-site scripting problems in the Acrobat Reader\n plugin were fixed, which could be exploited by remote\n attackers to conduct XSS attacks against any site that\n is providing PDFs. (CVE-2007-0045)\n\n - A double free problem in the Acrobat Reader plugin was\n fixed which could be used by remote attackers to\n potentially execute arbitrary code. Note that all\n platforms using Adobe Reader currently have counter\n measures against such attack where it will just cause a\n controlled abort(). (CVE-2007-0046)\n\n - CVE-2007-0047 and CVE-2007-0048 affect only Microsoft\n Windows and Internet Explorer.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2006-5857.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-0044.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-0045.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-0046.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2007-0047/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://support.novell.com/security/cve/CVE-2007-0048.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply YOU patch number 11433.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(352, 399);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:suse:suse_linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2007/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2009/09/24\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) exit(0, \"Local checks are not enabled.\");\nif (!get_kb_item(\"Host/SuSE/release\")) exit(0, \"The host is not running SuSE.\");\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) exit(1, \"Could not obtain the list of installed packages.\");\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) exit(1, \"Failed to determine the architecture type.\");\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") exit(1, \"Local checks for SuSE 9 on the '\"+cpu+\"' architecture have not been implemented.\");\n\n\nflag = 0;\nif (rpm_check(release:\"SUSE9\", reference:\"acroread-7.0.9-2.5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected.\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T01:14:23", "description": "The version of Adobe Reader installed on the remote host is earlier\nthan 7.0.9 / 8.0 and is, therefore, reportedly affected by several \nsecurity issues, including one that can lead to arbitrary code \nexecution when processing a malicious PDF file.", "edition": 25, "published": "2007-01-10T00:00:00", "title": "Adobe Reader < 6.0.6 / 7.0.9 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "ADOBE_READER_709.NASL", "href": "https://www.tenable.com/plugins/nessus/24002", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(24002);\n script_version(\"1.24\");\n script_cvs_date(\"Date: 2018/11/15 20:50:26\");\n\n script_cve_id(\n \"CVE-2006-5857\", \n \"CVE-2007-0044\", \n \"CVE-2007-0045\", \n \"CVE-2007-0046\",\n \"CVE-2007-0047\", \n \"CVE-2007-0048\"\n );\n script_bugtraq_id(21858, 21981);\n\n script_name(english:\"Adobe Reader < 6.0.6 / 7.0.9 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Adobe Reader\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The PDF file viewer on the remote Windows host is affected by several\nvulnerabilities.\" );\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote host is earlier\nthan 7.0.9 / 8.0 and is, therefore, reportedly affected by several \nsecurity issues, including one that can lead to arbitrary code \nexecution when processing a malicious PDF file.\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://www.piotrbania.com/all/adv/adobe-acrobat-adv.txt\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://seclists.org/fulldisclosure/2007/Jan/199\" );\n script_set_attribute(attribute:\"see_also\", value:\"http://www.adobe.com/support/security/bulletins/apsb07-01.html\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader 6.0.6 / 7.0.9 / 8.0 or later.\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(352, 399);\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2007/01/10\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2006/12/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value: \"2007/01/09\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n script_copyright(english:\"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.\");\n script_dependencies(\"adobe_reader_installed.nasl\");\n script_require_keys(\"SMB/Acroread/Version\");\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\n\n\ninfo = NULL;\nvers = get_kb_list('SMB/Acroread/Version');\nif (isnull(vers)) exit(0, 'The \"SMB/Acroread/Version\" KB item is missing.');\n\nforeach ver (vers)\n{\n if (ver =~ \"^([0-5]\\.|6\\.0\\.[0-5][^0-9.]?|7\\.0\\.[0-8][^0-9.]?)\")\n {\n path = get_kb_item('SMB/Acroread/'+ver+'/Path');\n if (isnull(path)) exit(1, 'The \"SMB/Acroread/'+ver+'/Path\" KB item is missing.');\n\n verui = get_kb_item('SMB/Acroread/'+ver+'/Version_UI');\n if (isnull(verui)) exit(1, 'The \"SMB/Acroread/'+ver+'/Version_UI\" KB item is missing.');\n\n info += ' - ' + verui + ', under ' + path + '\\n';\n }\n}\n\nif (isnull(info)) exit(0, 'The remote host is not affected.');\n\nif (report_verbosity > 0)\n{\n if (max_index(split(info)) > 1) s = \"s of Adobe Reader are\";\n else s = \" of Adobe Reader is\";\n\n report =\n '\\nThe following vulnerable instance'+s+' installed on the'+\n '\\nremote host :\\n\\n'+\n info;\n security_hole(port:get_kb_item(\"SMB/transport\"), extra:report);\n}\nelse security_hole(get_kb_item(\"SMB/transport\"));\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T01:13:01", "description": "The version of Adobe Acrobat installed on the remote host is earlier\nthan 6.0.6 / 7.0.9 / 8.0 and thus reportedly is affected by several\nsecurity issues, including one that can lead to arbitrary code\nexecution when processing a malicious PDF file.", "edition": 24, "published": "2009-08-28T00:00:00", "title": "Adobe Acrobat < 6.0.6 / 7.0.9 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "ADOBE_ACROBAT_709.NASL", "href": "https://www.tenable.com/plugins/nessus/40798", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(40798);\n script_version(\"1.13\");\n\n script_cve_id(\"CVE-2006-5857\", \"CVE-2007-0044\", \"CVE-2007-0045\", \"CVE-2007-0046\",\n \"CVE-2007-0047\", \"CVE-2007-0048\");\n script_bugtraq_id(21858, 21981);\n\n script_name(english:\"Adobe Acrobat < 6.0.6 / 7.0.9 Multiple Vulnerabilities\");\n script_summary(english:\"Checks version of Adobe Acrobat\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat on the remote Windows host is affected by\nmultiple vulnerabilities.\" );\n\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote host is earlier\nthan 6.0.6 / 7.0.9 / 8.0 and thus reportedly is affected by several\nsecurity issues, including one that can lead to arbitrary code\nexecution when processing a malicious PDF file.\" );\n\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.adobe.com/support/security/bulletins/apsb07-01.html\"\n );\n\n script_set_attribute(\n attribute:\"solution\",\n value: \"Upgrade to Adobe Acrobat 6.0.6 / 7.0.9 / 8.0 or later.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_cwe_id(352, 399);\n\n script_set_attribute( attribute:'vuln_publication_date', value:'2007/01/04' );\n script_set_attribute( attribute:'patch_publication_date', value:'2007/01/09' );\n script_set_attribute( attribute:'plugin_publication_date', value:'2009/08/28' );\n\n script_cvs_date(\"Date: 2018/06/27 18:42:26\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"adobe_acrobat_installed.nasl\");\n script_require_keys(\"SMB/Acrobat/Version\");\n\n exit(0);\n}\n\ninclude(\"global_settings.inc\");\n\nversion = get_kb_item(\"SMB/Acrobat/Version\");\nif (isnull(version)) exit(1, \"The 'SMB/Acrobat/Version' KB item is missing.\");\n\nif (version =~ \"^([0-5]\\.|6\\.0\\.[0-5][^0-9.]?|7\\.0\\.[0-8][^0-9.]?)\")\n{\n version_ui = get_kb_item(\"SMB/Acrobat/Version_UI\");\n if (report_verbosity > 0 && version_ui)\n {\n path = get_kb_item(\"SMB/Acrobat/Path\");\n if (isnull(path)) path = \"n/a\";\n\n report = string(\n \"\\n\",\n \" Path : \", path, \"\\n\",\n \" Installed version : \", version_ui, \"\\n\",\n \" Fix : 6.0.6 / 7.0.9 / 8.0\\n\"\n );\n security_hole(port:get_kb_item(\"SMB/transport\"), extra:report);\n }\n else security_hole(get_kb_item(\"SMB/transport\"));\n}\nelse exit(0, \"Acrobat \"+version+\" is not affected.\");\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2016-09-04T11:50:18", "bulletinFamily": "unix", "cvelist": ["CVE-2006-5857", "CVE-2007-0044", "CVE-2007-0047", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "edition": 1, "description": "The Adobe Acrobat Reader has been updated to version 7.0.9.\n#### Solution\nAs a workaround, you can use the free PDF readers, kpdf, xpdf, evince, and others. Please install the updated packages.", "modified": "2007-01-22T18:37:17", "published": "2007-01-22T18:37:17", "id": "SUSE-SA:2007:011", "href": "http://lists.opensuse.org/opensuse-security-announce/2007-01/msg00027.html", "type": "suse", "title": "remote code execution in acroread", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:09:22", "bulletinFamily": "software", "cvelist": ["CVE-2007-0044", "CVE-2007-0047", "CVE-2007-1199", "CVE-2007-0045", "CVE-2007-0048", "CVE-2007-0046"], "description": "1. By using URIs like http://path/to/pdf/file.pdf#whatever_name_you_want=javascript:your_code_here it's possible to execute code in context of any Web site where at least one PDF is stored. \r\n2. By using "trigger action" in PDF document it's possible to execute code in context of the web page where document is stored.\r\nThere are also more bugs exploitable thorugh a web page.", "edition": 1, "modified": "2007-01-04T00:00:00", "published": "2007-01-04T00:00:00", "id": "SECURITYVULNS:VULN:6994", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:6994", "title": "Adobe reader plugin PDF files universal crossite scripting", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}