{"cve": [{"lastseen": "2016-09-03T15:22:49", "bulletinFamily": "NVD", "description": "Adobe Photoshop 12.0 in Creative Suite 5 (CS5) and 12.1 in Creative Suite 5.1 (CS5.1) allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GIF file.", "modified": "2011-10-04T22:54:39", "published": "2011-08-11T18:55:00", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-2131", "id": "CVE-2011-2131", "title": "CVE-2011-2131", "type": "cve", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "exploitdb": [{"lastseen": "2016-02-02T08:24:45", "bulletinFamily": "exploit", "description": "Adobe Photoshop CS5 GIF Remote Code Execution. CVE-2011-2131. Dos exploit for windows platform", "modified": "2011-08-22T00:00:00", "published": "2011-08-22T00:00:00", "id": "EDB-ID:17712", "href": "https://www.exploit-db.com/exploits/17712/", "type": "exploitdb", "title": "Adobe Photoshop CS5 GIF Remote Code Execution", "sourceData": "#####################################################################################\r\n\r\nApplication: Adobe Photoshop CS5 GIF Remote Code Execution\r\n\r\nPlatforms: Adobe Photoshop CS5 (12.0 and 12.1)\r\n\r\nExploitation: Remote code execution\r\n\r\nCVE Number: CVE-2011-2131\r\n\r\nAdobe Vulnerability Identifier: APSB11-22\r\n\r\n{PRL}: 2011-08\r\n\r\nAuthor: Francis Provencher (Protek Research Lab's)\r\n\r\nWebsite: http://www.protekresearchlab.com/\r\n\r\nTwitter: @ProtekResearch\r\n\r\n#####################################################################################\r\n\r\n1) Introduction\r\n2) Timeline\r\n3) Technical details\r\n4) PoC\r\n\r\n\r\n#####################################################################################\r\n\r\n===============\r\n1) Introduction\r\n===============\r\nAdobe Photoshop is a graphics editing program developed and published by Adobe Systems Incorporated.\r\n\r\nAdobe's 2003 \"Creative Suite\" rebranding led to Adobe Photoshop 8's renaming to Adobe Photoshop CS. Thus,\r\n\r\nAdobe Photoshop CS5 is the 12th major release of Adobe Photoshop. The CS rebranding also resulted\r\n\r\nin Adobe offering numerous software packages containing multiple Adobe programs for a reduced price.\r\n\r\nAdobe Photoshop is released in two editions: Adobe Photoshop, and Adobe Photoshop Extended,\r\n\r\nwith the Extended having extra 3D image creation, motion graphics editing, and advanced image\r\n\r\nanalysis features.[3]. Adobe Photoshop Extended is included in all of Adobe's Creative Suite offerings\r\n\r\nexcept Design Standard, which includes the Adobe Photoshop edition.\r\n\r\nhttp://en.wikipedia.org/wiki/Adobe_Photoshop\r\n\r\n#####################################################################################\r\n\r\n============================\r\n2) Timeline\r\n============================\r\n\r\n2011-06-14 - Vulnerability reported to vendor\r\n2011-09-09 - Coordinated public release of advisory\r\n\r\n#####################################################################################\r\n\r\n============================\r\n3) Technical details\r\n============================\r\n\r\nThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations\r\n\r\nof Adobe PhotoShop CS5. User interaction is required to exploit this vulnerability in that the\r\n\r\ntarget must open a malicious GIF file. When the \"ushort ImageHeight\" is crafted with an invalid value\r\n\r\nthe memory is corrupted and arbitrary code can be run on the remote host.\r\n\r\n#####################################################################################\r\n\r\n===========\r\n4) The Code\r\n===========\r\n\r\nhttp://www.protekresearchlab.com/exploits/PRL-2011-08.gif\r\nhttps://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/17712.zip", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.exploit-db.com/download/17712/"}], "openvas": [{"lastseen": "2017-09-05T11:22:40", "bulletinFamily": "scanner", "description": "This host is installed with Adobe Photoshop and is prone to\n remote code execution vulnerability.", "modified": "2017-09-04T00:00:00", "published": "2011-08-29T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=902618", "id": "OPENVAS:902618", "title": "Adobe Photoshop '.GIF' File Processing Memory Corruption Vulnerability", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_adobe_photoshop_gif_mem_corruption_vuln.nasl 7052 2017-09-04 11:50:51Z teissa $\n#\n# Adobe Photoshop '.GIF' File Processing Memory Corruption Vulnerability\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\ntag_solution = \"Apply patch APSB11-22 for Adobe Photoshop CS5 and CS5.1\n For updates refer to http://www.adobe.com/support/security/bulletins/apsb11-22.html\n\n *****\n NOTE: Ignore this warning if patch is applied already.\n *****\";\n\ntag_impact = \"Successful exploitation could allow remote attackers to execute arbitrary\n code and cause Denial of Service.\n Impact Level: System/Application\";\ntag_affected = \"Adobe Photoshop CS5 through CS5.1\";\ntag_insight = \"The flaw is caused by memory corruptions error when processing a crafted\n '.GIF' file.\";\ntag_summary = \"This host is installed with Adobe Photoshop and is prone to\n remote code execution vulnerability.\";\n\nif(description)\n{\n script_id(902618);\n script_version(\"$Revision: 7052 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-09-04 13:50:51 +0200 (Mon, 04 Sep 2017) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-29 16:22:41 +0200 (Mon, 29 Aug 2011)\");\n script_cve_id(\"CVE-2011-2131\");\n script_bugtraq_id(49106);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Adobe Photoshop '.GIF' File Processing Memory Corruption Vulnerability\");\n\n script_xref(name : \"URL\" , value : \"http://securitytracker.com/id/1025910\");\n script_xref(name : \"URL\" , value : \"http://secunia.com/advisories/45587/\");\n script_xref(name : \"URL\" , value : \"http://www.adobe.com/support/security/bulletins/apsb11-22.html\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 SecPod\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_photoshop_detect.nasl\");\n script_require_keys(\"Adobe/Photoshop/Ver\");\n script_tag(name : \"impact\" , value : tag_impact);\n script_tag(name : \"affected\" , value : tag_affected);\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name : \"solution\" , value : tag_solution);\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\n\n## Variable Initiliazation\nadobeVer = \"\";\n\n## Get version from KB\n## Check for adobe versions CS5 and CS5.1\nadobeVer = get_kb_item(\"Adobe/Photoshop/Ver\");\nif(!adobeVer || \"CS5\" >!< adobeVer){\n exit(0);\n}\n\nadobeVer = eregmatch(pattern:\"CS([0-9.]+) ?([0-9.]+)\", string: adobeVer);\n\nif(!isnull(adobeVer[2]))\n{\n ## Grep for Adobe Photoshop 12.0 and 12.1\n if(version_is_equal(version:adobeVer[2], test_version:\"12.0\") ||\n version_is_equal(version:adobeVer[2], test_version:\"12.1\")){\n security_message(0);\n }\n}\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-10-22T16:44:13", "bulletinFamily": "scanner", "description": "This host is installed with Adobe Photoshop and is prone to\n remote code execution vulnerability.", "modified": "2018-10-22T00:00:00", "published": "2011-08-29T00:00:00", "id": "OPENVAS:1361412562310902618", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310902618", "title": "Adobe Photoshop '.GIF' File Processing Memory Corruption Vulnerability", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: secpod_adobe_photoshop_gif_mem_corruption_vuln.nasl 12010 2018-10-22 08:23:57Z mmartin $\n#\n# Adobe Photoshop '.GIF' File Processing Memory Corruption Vulnerability\n#\n# Authors:\n# Rachana Shetty <srachana@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2011 SecPod, http://www.secpod.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.902618\");\n script_version(\"$Revision: 12010 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-22 10:23:57 +0200 (Mon, 22 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2011-08-29 16:22:41 +0200 (Mon, 29 Aug 2011)\");\n script_cve_id(\"CVE-2011-2131\");\n script_bugtraq_id(49106);\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_name(\"Adobe Photoshop '.GIF' File Processing Memory Corruption Vulnerability\");\n\n script_xref(name:\"URL\", value:\"http://securitytracker.com/id/1025910\");\n script_xref(name:\"URL\", value:\"http://secunia.com/advisories/45587/\");\n script_xref(name:\"URL\", value:\"http://www.adobe.com/support/security/bulletins/apsb11-22.html\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod\", value:\"30\"); # nb: Version check below doesn't check the patch version...\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2011 SecPod\");\n script_family(\"General\");\n script_dependencies(\"gb_adobe_photoshop_detect.nasl\");\n script_mandatory_keys(\"Adobe/Photoshop/Ver\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation could allow remote attackers to execute arbitrary\n code and cause Denial of Service.\");\n script_tag(name:\"affected\", value:\"Adobe Photoshop CS5 through CS5.1\");\n script_tag(name:\"insight\", value:\"The flaw is caused by memory corruptions error when processing a crafted\n '.GIF' file.\");\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Photoshop and is prone to\n remote code execution vulnerability.\");\n script_tag(name:\"solution\", value:\"Apply patch APSB11-22 for Adobe Photoshop CS5 and CS5.1 *****\n NOTE: Ignore this warning if patch is applied already.\n *****\");\n\n script_xref(name:\"URL\", value:\"http://www.adobe.com/support/security/bulletins/apsb11-22.html\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\ncpe_list = make_list( \"cpe:/a:adobe:photoshop_cs5\",\n \"cpe:/a:adobe:photoshop_cs5.1\" );\n\nif( ! vers = get_app_version( cpe:cpe_list ) ) exit( 0 );\n\nif( version_is_equal( version:vers, test_version:\"12.0\" ) ||\n version_is_equal( version:vers, test_version:\"12.1\" ) ) {\n report = report_fixed_ver( installed_version:vers, fixed_version:\"See references\" );\n security_message( port:0, data:report );\n exit( 0 );\n}\n\nexit( 99 );\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "seebug": [{"lastseen": "2017-11-19T17:59:58", "bulletinFamily": "exploit", "description": "No description provided by source.", "modified": "2011-08-23T00:00:00", "published": "2011-08-23T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-20893", "id": "SSV:20893", "title": "Adobe Photoshop CS5 GIF Remote Code Execution", "type": "seebug", "sourceData": "\n #####################################################################################\r\nApplication: Adobe Photoshop CS5 GIF Remote Code Execution\r\nPlatforms: Adobe Photoshop CS5 (12.0 and 12.1)\r\nExploitation: Remote code execution\r\nCVE Number: CVE-2011-2131\r\nAdobe Vulnerability Identifier: APSB11-22\r\n{PRL}: 2011-08\r\nAuthor: Francis Provencher (Protek Research Lab's)\r\nWebsite: http://www.protekresearchlab.com/\r\nTwitter: @ProtekResearch\r\n#####################################################################################\r\n \r\n1) Introduction\r\n2) Timeline\r\n3) Technical details\r\n4) PoC\r\n \r\n \r\n#####################################################################################\r\n \r\n===============\r\n1) Introduction\r\n===============\r\nAdobe Photoshop is a graphics editing program developed and published by Adobe Systems Incorporated.\r\n \r\nAdobe's 2003 "Creative Suite" rebranding led to Adobe Photoshop 8's renaming to Adobe Photoshop CS. Thus,\r\n \r\nAdobe Photoshop CS5 is the 12th major release of Adobe Photoshop. The CS rebranding also resulted\r\n \r\nin Adobe offering numerous software packages containing multiple Adobe programs for a reduced price.\r\n \r\nAdobe Photoshop is released in two editions: Adobe Photoshop, and Adobe Photoshop Extended,\r\n \r\nwith the Extended having extra 3D image creation, motion graphics editing, and advanced image\r\n \r\nanalysis features.[3]. Adobe Photoshop Extended is included in all of Adobe's Creative Suite offerings\r\n \r\nexcept Design Standard, which includes the Adobe Photoshop edition.\r\n \r\nhttp://en.wikipedia.org/wiki/Adobe_Photoshop\r\n \r\n#####################################################################################\r\n \r\n============================\r\n2) Timeline\r\n============================\r\n \r\n2011-06-14 - Vulnerability reported to vendor\r\n2011-09-09 - Coordinated public release of advisory\r\n \r\n#####################################################################################\r\n \r\n============================\r\n3) Technical details\r\n============================\r\n \r\nThis vulnerability allows remote attackers to execute arbitrary code on vulnerable installations\r\n \r\nof Adobe PhotoShop CS5. User interaction is required to exploit this vulnerability in that the\r\n \r\ntarget must open a malicious GIF file. When the "ushort ImageHeight" is crafted with an invalid value\r\n \r\nthe memory is corrupted and arbitrary code can be run on the remote host.\r\n \r\n#####################################################################################\r\n \r\n===========\r\n4) The Code\r\n===========\r\n \r\nhttp://www.protekresearchlab.com/exploits/PRL-2011-08.gif\r\nhttp://exploit-db.com/sploits/17712.zip\r\nhttp://sebug.net/paper/Exploits-Archives/2011-exploits/20893_CVE-2011-2131.zip\n ", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-20893"}], "nessus": [{"lastseen": "2019-02-21T01:15:15", "bulletinFamily": "scanner", "description": "The version of Adobe Photoshop CS5 installed on the remote host includes a filter plug-in, 'Standard MultiPlugin', that has a critical memory corruption vulnerability.\n\nIf an attacker could trick a user on the affected system into opening a malicious GIF file using the application, he could leverage the vulnerability to execute arbitrary code remotely on the system subject to the user's privileges. This could result in a system compromise.", "modified": "2018-11-15T00:00:00", "id": "ADOBE_PHOTOSHOP_APSB11-22.NASL", "href": "https://www.tenable.com/plugins/index.php?view=single&id=55815", "published": "2011-08-11T00:00:00", "title": "Adobe Photoshop CS5 GIF File Memory Corruption (APSB11-22)", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\ninclude(\"compat.inc\");\n\n\nif (description)\n{\n script_id(55815);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2018/11/15 20:50:26\");\n\n script_cve_id(\"CVE-2011-2131\");\n script_bugtraq_id(49106);\n script_xref(name:\"EDB-ID\", value:\"17712\");\n\n script_name(english:\"Adobe Photoshop CS5 GIF File Memory Corruption (APSB11-22)\");\n script_summary(english:\"Checks Photoshop version\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host has an application that is affected by a\nmemory corruption vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Photoshop CS5 installed on the remote host\nincludes a filter plug-in, 'Standard MultiPlugin', that has a critical\nmemory corruption vulnerability.\n\nIf an attacker could trick a user on the affected system into opening\na malicious GIF file using the application, he could leverage the\nvulnerability to execute arbitrary code remotely on the system subject\nto the user's privileges. This could result in a system compromise.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.adobe.com/support/security/bulletins/apsb11-22.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Photoshop CS5 / CS5.1 if necessary, then apply the\nPhotoshop CS5 / CS5.1 Standard MultiPlugin Update.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2011/08/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2011/08/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2011/08/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:photoshop\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"adobe_photoshop_installed.nasl\");\n script_require_keys(\"SMB/Adobe_Photoshop/Installed\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\n\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"audit.inc\");\n\nkb_base = \"SMB/Adobe_Photoshop/\";\nget_kb_item_or_exit(kb_base+\"Installed\");\n\nversions = get_kb_list(kb_base+'Version');\nif (isnull(versions)) exit(1, \"The '\"+kb_base+\"Version' KB list is missing.\");\n\n\n# Identify installs of CS5.1 and earlier.\npaths = make_array();\ninfo2 = '';\n\nforeach version (versions)\n{\n path = get_kb_item(kb_base+version+'/Path');\n if (isnull(path)) path = 'n/a';\n\n ver = split(version, sep:'.', keep:FALSE);\n for (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\n verui = get_kb_item(kb_base+version+'/Version_UI');\n if (isnull(verui)) verui = version;\n\n if (\n ver[0] < 12 ||\n ver[0] == 12 && ver[1] <= 1\n )\n {\n paths[path] = version;\n }\n else info2 += \" and \" + verui;\n}\n\nif (max_index(keys(paths)) == 0)\n{\n if (info2)\n {\n info2 -= \" and \";\n if (\" and \" >< info2) be = \"are\";\n else be = \"is\";\n\n exit(0, \"The host is not affected since Adobe Photoshop \"+info2+\" \"+be+\" installed.\");\n }\n else exit(1, \"Unexpected error - 'info2' is empty.\");\n}\n\n\n# Establish a session.\nname = kb_smb_name();\nport = kb_smb_transport();\n#if (!get_port_state(port)) exit(1, \"Port \"+port+\" is not open.\");\nlogin = kb_smb_login();\npass = kb_smb_password();\ndomain = kb_smb_domain();\n\n#soc = open_sock_tcp(port);\n#if (!soc) exit(1, \"Failed to open a socket on port \"+port+\".\");\n\n#session_init(socket:soc, hostname:name);\n\nif(!smb_session_init()) audit(AUDIT_FN_FAIL, 'smb_session_init');\n\n\n# Check each install we identified earlier.\ninfo = '';\ninfo2 = '';\n\nforeach path (keys(paths))\n{\n version = paths[path];\n\n # Determine the directory with Photoshop's plug-ins.\n plugin_path = \"\";\n match = eregmatch(pattern:\"^([0-9]+\\.[0-9]+)\\.\", string:version);\n if (!isnull(match))\n {\n highlevel_version = match[1];\n rc = NetUseAdd(login:login, password:pass, domain:domain, share:\"IPC$\");\n if (rc != 1)\n {\n NetUseDel();\n exit(1, \"Can't connect to IPC$ share.\");\n }\n\n hklm = RegConnectRegistry(hkey:HKEY_LOCAL_MACHINE);\n if (isnull(hklm))\n {\n NetUseDel();\n exit(1, \"Can't connect to remote registry.\");\n }\n\n key = strcat(\"SOFTWARE\\Adobe\\Photoshop\\\", highlevel_version);\n key_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);\n if (!isnull(key_h))\n {\n item = RegQueryValue(handle:key_h, item:\"PluginPath\");\n if (!isnull(item))\n {\n plugin_path = item[1];\n plugin_path = ereg_replace(pattern:\"^(.+)\\\\$\", replace:\"\\1\", string:plugin_path);\n }\n RegCloseKey(handle:key_h);\n }\n if (!plugin_path)\n {\n key = strcat(key, \"\\PluginPath\");\n key_h = RegOpenKey(handle:hklm, key:key, mode:MAXIMUM_ALLOWED);\n if (!isnull(key_h))\n {\n item = RegQueryValue(handle:key_h, item:NULL);\n if (!isnull(item))\n {\n plugin_path = item[1];\n plugin_path = ereg_replace(pattern:\"^(.+)\\\\$\", replace:\"\\1\", string:plugin_path);\n }\n RegCloseKey(handle:key_h);\n }\n }\n RegCloseKey(handle:hklm);\n NetUseDel(close:FALSE);\n }\n if (!plugin_path) plugin_path = path + \"\\Plug-ins\";\n\n share = ereg_replace(pattern:\"^([A-Za-z]):.*\", replace:\"\\1$\", string:plugin_path);\n rc = NetUseAdd(login:login, password:pass, domain:domain, share:share);\n if (rc != 1)\n {\n NetUseDel();\n exit(1, \"Can't connect to \"+share+\" share.\");\n }\n\n plugin = ereg_replace(pattern:\"^[A-Za-z]:(.*)\", replace:\"\\1\\Filters\\Standard MultiPlugin.8BF\", string:plugin_path);\n fh = CreateFile(\n file : plugin,\n desired_access : GENERIC_READ,\n file_attributes : FILE_ATTRIBUTE_NORMAL,\n share_mode : FILE_SHARE_READ,\n create_disposition : OPEN_EXISTING\n );\n if (!isnull(fh))\n {\n plugin_version = \"\";\n\n fsize = GetFileSize(handle:fh);\n chunk = 16384;\n\n if (fsize < 100000) ofs = 0;\n else ofs = int(fsize / 2);\n\n while (fsize > 0 && ofs <= fsize)\n {\n data = ReadFile(handle:fh, length:chunk, offset:ofs);\n if (strlen(data) == 0) break;\n data = str_replace(find:raw_string(0), replace:\"\", string:data);\n\n match = eregmatch(pattern:\"\\\\([0-9]{8}\\.[a-zA-Z]\\.[0-9]+)\\\\\", string:data);\n if (!isnull(match))\n {\n plugin_version = match[1];\n break;\n }\n ofs += chunk - 64;\n }\n\n CloseFile(handle:fh);\n\n if (!plugin_version)\n {\n NetUseDel();\n exit(1, \"Couldn't get file version of '\"+(share-'$')+\":\"+plugin+\"'.\");\n }\n\n yyyy = int(substr(plugin_version, 0, 3));\n mmdd = int(substr(plugin_version, 4, 7));\n r = int(substr(plugin_version, 11));\n if (\n yyyy < 2011 ||\n (yyyy == 2011 && mmdd < 0718)\n )\n {\n product_name = get_kb_item(kb_base+version+'/Product');\n if (isnull(product_name)) product_name = \"Adobe Photoshop\";\n\n info += '\\n Product : ' + product_name +\n '\\n File : ' + (share-'$')+\":\"+plugin +\n '\\n Installed version : ' + plugin_version +\n '\\n Fixed version : 20110718.r.1299\\n';\n }\n else info2 += \" and \" + plugin_version;\n }\n NetUseDel(close:FALSE);\n}\nNetUseDel();\n\n\n# Report if an issue was found.\nif (info)\n{\n if (report_verbosity > 0)\n {\n if (vuln > 1) s = \"s of Adobe Photoshop are\";\n else s = \" of Adobe Photoshop is\";\n\n report =\n '\\nThe following vulnerable instance'+s+' installed on the'+\n '\\nremote host :\\n'+\n info;\n security_hole(port:get_kb_item(\"SMB/transport\"), extra:report);\n }\n else security_hole(get_kb_item(\"SMB/transport\"));\n\n exit(0);\n}\nif (info2)\n{\n info2 -= \" and \";\n if (\" and \" >< info2) be = \"are\";\n else be = \"is\";\n\n exit(0, \"The host is not affected since Standard MultiPlugin \"+info2+\" \"+be+\" installed.\");\n}\nelse exit(0, \"The Standard MultiPlugin plugin is not installed, and thus the host is not affected.\");\n", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}