This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ImageConversion's TIFF parsing. The process does not properly validate user-supplied data which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process.
{"id": "ZDI-17-010", "vendorId": null, "type": "zdi", "bulletinFamily": "info", "title": "Adobe Acrobat Pro DC ImageConversion TIFF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability", "description": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Adobe Acrobat Pro DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within ImageConversion's TIFF parsing. The process does not properly validate user-supplied data which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process.", "published": "2017-01-10T00:00:00", "modified": "2017-01-10T00:00:00", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 1.8, "impactScore": 5.9}, "href": "https://www.zerodayinitiative.com/advisories/ZDI-17-010/", "reporter": "Ke Liu of Tencent's Xuanwu LAB", "references": ["https://helpx.adobe.com/security/products/acrobat/apsb17-01.html"], "cvelist": ["CVE-2017-2965"], "immutableFields": [], "lastseen": "2022-02-10T00:00:00", "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "adobe", "idList": ["APSB17-01"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2017-0033"]}, {"type": "cve", "idList": ["CVE-2017-2965"]}, {"type": "kaspersky", "idList": ["KLA10935"]}, {"type": "nessus", "idList": ["ADOBE_ACROBAT_APSB17-01.NASL", "ADOBE_READER_APSB17-01.NASL", "MACOSX_ADOBE_ACROBAT_APSB17-01.NASL", "MACOSX_ADOBE_READER_APSB17-01.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310810332", "OPENVAS:1361412562310810333", "OPENVAS:1361412562310810334", "OPENVAS:1361412562310810335"]}], "rev": 4}, "score": {"value": 5.0, "vector": "NONE"}, "backreferences": {"references": [{"type": "adobe", "idList": ["APSB17-01"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2017-0033"]}, {"type": "cve", "idList": ["CVE-2017-2965"]}, {"type": "kaspersky", "idList": ["KLA10935"]}, {"type": "nessus", "idList": ["ADOBE_ACROBAT_APSB17-01.NASL", "ADOBE_READER_APSB17-01.NASL", "MACOSX_ADOBE_ACROBAT_APSB17-01.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310810332", "OPENVAS:1361412562310810333", "OPENVAS:1361412562310810334", "OPENVAS:1361412562310810335"]}]}, "exploitation": null, "vulnersScore": 5.0}, "_state": {"dependencies": 1647589307, "score": 0}}
{"checkpoint_advisories": [{"lastseen": "2021-12-17T11:37:52", "description": "A memory corruption vulnerability exists in Adobe Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker could trigger this issue via a specially crafted TIFF file.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-01-15T00:00:00", "type": "checkpoint_advisories", "title": "Adobe Acrobat and Reader Memory Corruption (APSB17-01: CVE-2017-2965)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-2965"], "modified": "2017-01-26T00:00:00", "id": "CPAI-2017-0033", "href": "", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2022-03-23T16:06:59", "description": "Adobe Acrobat Reader versions 15.020.20042 and earlier, 15.006.30244 and earlier, 11.0.18 and earlier have an exploitable memory corruption vulnerability in the image conversion engine, related to TIFF file parsing. Successful exploitation could lead to arbitrary code execution.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2017-01-11T04:59:00", "type": "cve", "title": "CVE-2017-2965", "cwe": ["CWE-119"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-2965"], "modified": "2017-01-18T02:59:00", "cpe": ["cpe:/a:adobe:acrobat:11.0.18", "cpe:/a:adobe:acrobat_reader_dc:15.020.20042", "cpe:/a:adobe:acrobat_reader_dc:15.006.30244", "cpe:/a:adobe:acrobat_dc:15.006.30244", "cpe:/a:adobe:acrobat_dc:15.020.20042", "cpe:/a:adobe:reader:11.0.18"], "id": "CVE-2017-2965", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-2965", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:a:adobe:acrobat:11.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:15.020.20042:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:reader:11.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:15.006.30244:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:15.020.20042:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:15.006.30244:*:*:*:classic:*:*:*"]}], "nessus": [{"lastseen": "2022-06-16T16:10:53", "description": "The version of Adobe Acrobat installed on the remote macOS or Mac OS X host is prior to 11.0.19, 15.006.30279, or 15.023.20053. It is, therefore, affected by multiple vulnerabilities :\n\n - Multiple memory corruption issues exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941, CVE-2017-2943, CVE-2017-2944, CVE-2017-2953, CVE-2017-2954)\n\n - Multiple heap buffer overflow conditions exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2942, CVE-2017-2945, CVE-2017-2959)\n\n - A heap buffer overflow condition exists when handling JPEG2000 images due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to execute arbitrary code.\n (CVE-2017-2946)\n\n - An unspecified security bypass vulnerability exists that allows an unauthenticated, remote attacker to have an unspecified impact. (CVE-2017-2947)\n\n - Multiple overflow conditions exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2948, CVE-2017-2952)\n\n - A heap buffer overflow condition exists when handling the XSLT element-available() function that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2949)\n\n - Multiple use-after-free memory errors exist when handling XFA subform layouts, hyphenation objects, field font sizes, and template objects. An unauthenticated, remote attacker can exploit these to execute arbitrary code.\n (CVE-2017-2950, CVE-2017-2951, CVE-2017-2961, CVE-2017-2967)\n\n - Multiple use-after-free memory errors exist that allow an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2955, CVE-2017-2956, CVE-2017-2957, CVE-2017-2958)\n\n - Multiple memory corruption issues exist when handling JPEG and TIFF files due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code.\n (CVE-2017-2960, CVE-2017-2963, CVE-2017-2964, CVE-2017-2965)\n\n - A type confusion error exists when handling the XSLT lang() function that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2962)\n\n - A heap buffer overflow condition exists in the ImageConversion component when handling TIFF images() due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2017-2966)\n\n - A buffer overflow condition exists in the JPEG2000 parser due to improper validation of unspecified input.\n An unauthenticated, remote attacker can exploit this to disclose sensitive information. (CVE-2017-3009)\n\n - A memory corruption issue exists in the Rendering engine due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-3010)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-01-12T00:00:00", "type": "nessus", "title": "Adobe Acrobat < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-2939", "CVE-2017-2940", "CVE-2017-2941", "CVE-2017-2942", "CVE-2017-2943", "CVE-2017-2944", "CVE-2017-2945", "CVE-2017-2946", "CVE-2017-2947", "CVE-2017-2948", "CVE-2017-2949", "CVE-2017-2950", "CVE-2017-2951", "CVE-2017-2952", "CVE-2017-2953", "CVE-2017-2954", "CVE-2017-2955", "CVE-2017-2956", "CVE-2017-2957", "CVE-2017-2958", "CVE-2017-2959", "CVE-2017-2960", "CVE-2017-2961", "CVE-2017-2962", "CVE-2017-2963", "CVE-2017-2964", "CVE-2017-2965", "CVE-2017-2966", "CVE-2017-2967", "CVE-2017-3009", "CVE-2017-3010"], "modified": "2019-11-13T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "MACOSX_ADOBE_ACROBAT_APSB17-01.NASL", "href": "https://www.tenable.com/plugins/nessus/96454", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(96454);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2017-2939\",\n \"CVE-2017-2940\",\n \"CVE-2017-2941\",\n \"CVE-2017-2942\",\n \"CVE-2017-2943\",\n \"CVE-2017-2944\",\n \"CVE-2017-2945\",\n \"CVE-2017-2946\",\n \"CVE-2017-2947\",\n \"CVE-2017-2948\",\n \"CVE-2017-2949\",\n \"CVE-2017-2950\",\n \"CVE-2017-2951\",\n \"CVE-2017-2952\",\n \"CVE-2017-2953\",\n \"CVE-2017-2954\",\n \"CVE-2017-2955\",\n \"CVE-2017-2956\",\n \"CVE-2017-2957\",\n \"CVE-2017-2958\",\n \"CVE-2017-2959\",\n \"CVE-2017-2960\",\n \"CVE-2017-2961\",\n \"CVE-2017-2962\",\n \"CVE-2017-2963\",\n \"CVE-2017-2964\",\n \"CVE-2017-2965\",\n \"CVE-2017-2966\",\n \"CVE-2017-2967\",\n \"CVE-2017-3009\",\n \"CVE-2017-3010\"\n );\n script_bugtraq_id(\n 95340,\n 95343,\n 95344,\n 95345,\n 95346,\n 95348,\n 97302,\n 97306\n );\n\n script_name(english:\"Adobe Acrobat < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01) (macOS)\");\n script_summary(english:\"Checks the version of Adobe Acrobat.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote macOS or Mac OS\nX host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote macOS or Mac OS\nX host is prior to 11.0.19, 15.006.30279, or 15.023.20053. It is,\ntherefore, affected by multiple vulnerabilities :\n\n - Multiple memory corruption issues exist due to improper\n validation of unspecified input. An unauthenticated,\n remote attacker can exploit these to execute arbitrary\n code. (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941,\n CVE-2017-2943, CVE-2017-2944, CVE-2017-2953,\n CVE-2017-2954)\n\n - Multiple heap buffer overflow conditions exist due to\n improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit these to\n execute arbitrary code. (CVE-2017-2942, CVE-2017-2945,\n CVE-2017-2959)\n\n - A heap buffer overflow condition exists when handling\n JPEG2000 images due to improper validation of\n unspecified input. An unauthenticated, remote attacker\n can exploit this to execute arbitrary code.\n (CVE-2017-2946)\n\n - An unspecified security bypass vulnerability exists that\n allows an unauthenticated, remote attacker to have an\n unspecified impact. (CVE-2017-2947)\n\n - Multiple overflow conditions exist due to improper\n validation of unspecified input. An unauthenticated,\n remote attacker can exploit these to execute arbitrary\n code. (CVE-2017-2948, CVE-2017-2952)\n\n - A heap buffer overflow condition exists when handling\n the XSLT element-available() function that allows an\n unauthenticated, remote attacker to execute arbitrary\n code. (CVE-2017-2949)\n\n - Multiple use-after-free memory errors exist when handling\n XFA subform layouts, hyphenation objects, field font\n sizes, and template objects. An unauthenticated, remote\n attacker can exploit these to execute arbitrary code.\n (CVE-2017-2950, CVE-2017-2951, CVE-2017-2961,\n CVE-2017-2967)\n\n - Multiple use-after-free memory errors exist that allow\n an unauthenticated, remote attacker to execute arbitrary\n code. (CVE-2017-2955, CVE-2017-2956, CVE-2017-2957,\n CVE-2017-2958)\n\n - Multiple memory corruption issues exist when handling\n JPEG and TIFF files due to improper validation of\n unspecified input. An unauthenticated, remote attacker\n can exploit these to execute arbitrary code.\n (CVE-2017-2960, CVE-2017-2963, CVE-2017-2964,\n CVE-2017-2965)\n\n - A type confusion error exists when handling the XSLT\n lang() function that allows an unauthenticated, remote\n attacker to execute arbitrary code. (CVE-2017-2962)\n\n - A heap buffer overflow condition exists in the\n ImageConversion component when handling TIFF images()\n due to improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit this to\n execute arbitrary code. (CVE-2017-2966)\n\n - A buffer overflow condition exists in the JPEG2000\n parser due to improper validation of unspecified input.\n An unauthenticated, remote attacker can exploit this to\n disclose sensitive information. (CVE-2017-3009)\n\n - A memory corruption issue exists in the Rendering engine\n due to improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-3010)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat version 11.0.19 / 15.006.30279 / 15.023.20053\nor later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-3010\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_acrobat_installed.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nget_kb_item_or_exit(\"Host/local_checks_enabled\");\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\napp_name = \"Adobe Acrobat\";\ninstall = get_single_install(app_name:app_name);\n\nversion = install['version'];\npath = install['path'];\n\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\n# Affected is :\n#\n# 11.x < 11.0.19\n# DC Classic < 15.006.30279\n# DC Continuous < 15.023.20053\nif (\n (ver[0] == 11 && ver[1] == 0 && ver[2] <= 18) ||\n (ver[0] == 15 && ver[1] == 6 && ver[2] <= 30244) ||\n (ver[0] == 15 && ver[1] >= 7 && ver[1] <= 19) ||\n (ver[0] == 15 && ver[1] == 20 && ver[2] <= 20042)\n)\n{\n report = '\\n Path : '+path+\n '\\n Installed version : '+version+\n '\\n Fixed version : 11.0.19 / 15.006.30279 / 15.023.20053' +\n '\\n';\n security_report_v4(port:0, extra:report, severity:SECURITY_HOLE);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-16T16:12:13", "description": "The version of Adobe Acrobat installed on the remote Windows host is prior to 11.0.19, 15.006.30279, or 15.023.20053. It is, therefore, affected by multiple vulnerabilities :\n\n - Multiple memory corruption issues exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941, CVE-2017-2943, CVE-2017-2944, CVE-2017-2953, CVE-2017-2954)\n\n - Multiple heap buffer overflow conditions exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2942, CVE-2017-2945, CVE-2017-2959)\n\n - A heap buffer overflow condition exists when handling JPEG2000 images due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to execute arbitrary code.\n (CVE-2017-2946)\n\n - An unspecified security bypass vulnerability exists that allows an unauthenticated, remote attacker to have an unspecified impact. (CVE-2017-2947)\n\n - Multiple overflow conditions exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2948, CVE-2017-2952)\n\n - A heap buffer overflow condition exists when handling the XSLT element-available() function that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2949)\n\n - Multiple use-after-free memory errors exist when handling XFA subform layouts, hyphenation objects, field font sizes, and template objects. An unauthenticated, remote attacker can exploit these to execute arbitrary code.\n (CVE-2017-2950, CVE-2017-2951, CVE-2017-2961, CVE-2017-2967)\n\n - Multiple use-after-free memory errors exist that allow an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2955, CVE-2017-2956, CVE-2017-2957, CVE-2017-2958)\n\n - Multiple memory corruption issues exist when handling JPEG and TIFF files due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code.\n (CVE-2017-2960, CVE-2017-2963, CVE-2017-2964, CVE-2017-2965)\n\n - A type confusion error exists when handling the XSLT lang() function that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2962)\n\n - A heap buffer overflow condition exists in the ImageConversion component when handling TIFF images() due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2017-2966)\n\n - A buffer overflow condition exists in the JPEG2000 parser due to improper validation of unspecified input.\n An unauthenticated, remote attacker can exploit this to disclose sensitive information. (CVE-2017-3009)\n\n - A memory corruption issue exists in the Rendering engine due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-3010)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-01-12T00:00:00", "type": "nessus", "title": "Adobe Acrobat < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-2939", "CVE-2017-2940", "CVE-2017-2941", "CVE-2017-2942", "CVE-2017-2943", "CVE-2017-2944", "CVE-2017-2945", "CVE-2017-2946", "CVE-2017-2947", "CVE-2017-2948", "CVE-2017-2949", "CVE-2017-2950", "CVE-2017-2951", "CVE-2017-2952", "CVE-2017-2953", "CVE-2017-2954", "CVE-2017-2955", "CVE-2017-2956", "CVE-2017-2957", "CVE-2017-2958", "CVE-2017-2959", "CVE-2017-2960", "CVE-2017-2961", "CVE-2017-2962", "CVE-2017-2963", "CVE-2017-2964", "CVE-2017-2965", "CVE-2017-2966", "CVE-2017-2967", "CVE-2017-3009", "CVE-2017-3010"], "modified": "2019-11-13T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "ADOBE_ACROBAT_APSB17-01.NASL", "href": "https://www.tenable.com/plugins/nessus/96452", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(96452);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2017-2939\",\n \"CVE-2017-2940\",\n \"CVE-2017-2941\",\n \"CVE-2017-2942\",\n \"CVE-2017-2943\",\n \"CVE-2017-2944\",\n \"CVE-2017-2945\",\n \"CVE-2017-2946\",\n \"CVE-2017-2947\",\n \"CVE-2017-2948\",\n \"CVE-2017-2949\",\n \"CVE-2017-2950\",\n \"CVE-2017-2951\",\n \"CVE-2017-2952\",\n \"CVE-2017-2953\",\n \"CVE-2017-2954\",\n \"CVE-2017-2955\",\n \"CVE-2017-2956\",\n \"CVE-2017-2957\",\n \"CVE-2017-2958\",\n \"CVE-2017-2959\",\n \"CVE-2017-2960\",\n \"CVE-2017-2961\",\n \"CVE-2017-2962\",\n \"CVE-2017-2963\",\n \"CVE-2017-2964\",\n \"CVE-2017-2965\",\n \"CVE-2017-2966\",\n \"CVE-2017-2967\",\n \"CVE-2017-3009\",\n \"CVE-2017-3010\"\n );\n script_bugtraq_id(\n 95340,\n 95343,\n 95344,\n 95345,\n 95346,\n 95348,\n 97302,\n 97306\n );\n\n script_name(english:\"Adobe Acrobat < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01)\");\n script_summary(english:\"Checks the version of Adobe Acrobat.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is\nprior to 11.0.19, 15.006.30279, or 15.023.20053. It is, therefore,\naffected by multiple vulnerabilities :\n\n - Multiple memory corruption issues exist due to improper\n validation of unspecified input. An unauthenticated,\n remote attacker can exploit these to execute arbitrary\n code. (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941,\n CVE-2017-2943, CVE-2017-2944, CVE-2017-2953,\n CVE-2017-2954)\n\n - Multiple heap buffer overflow conditions exist due to\n improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit these to\n execute arbitrary code. (CVE-2017-2942, CVE-2017-2945,\n CVE-2017-2959)\n\n - A heap buffer overflow condition exists when handling\n JPEG2000 images due to improper validation of\n unspecified input. An unauthenticated, remote attacker\n can exploit this to execute arbitrary code.\n (CVE-2017-2946)\n\n - An unspecified security bypass vulnerability exists that\n allows an unauthenticated, remote attacker to have an\n unspecified impact. (CVE-2017-2947)\n\n - Multiple overflow conditions exist due to improper\n validation of unspecified input. An unauthenticated,\n remote attacker can exploit these to execute arbitrary\n code. (CVE-2017-2948, CVE-2017-2952)\n\n - A heap buffer overflow condition exists when handling\n the XSLT element-available() function that allows an\n unauthenticated, remote attacker to execute arbitrary\n code. (CVE-2017-2949)\n\n - Multiple use-after-free memory errors exist when handling\n XFA subform layouts, hyphenation objects, field font\n sizes, and template objects. An unauthenticated, remote\n attacker can exploit these to execute arbitrary code.\n (CVE-2017-2950, CVE-2017-2951, CVE-2017-2961,\n CVE-2017-2967)\n\n - Multiple use-after-free memory errors exist that allow\n an unauthenticated, remote attacker to execute arbitrary\n code. (CVE-2017-2955, CVE-2017-2956, CVE-2017-2957,\n CVE-2017-2958)\n\n - Multiple memory corruption issues exist when handling\n JPEG and TIFF files due to improper validation of\n unspecified input. An unauthenticated, remote attacker\n can exploit these to execute arbitrary code.\n (CVE-2017-2960, CVE-2017-2963, CVE-2017-2964,\n CVE-2017-2965)\n\n - A type confusion error exists when handling the XSLT\n lang() function that allows an unauthenticated, remote\n attacker to execute arbitrary code. (CVE-2017-2962)\n\n - A heap buffer overflow condition exists in the\n ImageConversion component when handling TIFF images()\n due to improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit this to\n execute arbitrary code. (CVE-2017-2966)\n\n - A buffer overflow condition exists in the JPEG2000\n parser due to improper validation of unspecified input.\n An unauthenticated, remote attacker can exploit this to\n disclose sensitive information. (CVE-2017-3009)\n\n - A memory corruption issue exists in the Rendering engine\n due to improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-3010)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat version 11.0.19 / 15.006.30279 / 15.023.20053\nor later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-3010\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_acrobat_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\n\napp_name = \"Adobe Acrobat\";\ninstall = get_single_install(app_name:app_name);\n\nversion = install['version'];\npath = install['path'];\nverui = install['display_version'];\n\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\n# Affected is :\n#\n# 11.x < 11.0.19\n# DC Classic < 15.006.30279\n# DC Continuous < 15.023.20053\nif (\n (ver[0] == 11 && ver[1] == 0 && ver[2] <= 18) ||\n (ver[0] == 15 && ver[1] == 6 && ver[2] <= 30244) ||\n (ver[0] == 15 && ver[1] >= 7 && ver[1] <= 19) ||\n (ver[0] == 15 && ver[1] == 20 && ver[2] <= 20042)\n)\n{\n port = get_kb_item('SMB/transport');\n if(!port) port = 445;\n\n report = '\\n Path : '+path+\n '\\n Installed version : '+verui+\n '\\n Fixed version : 11.0.19 / 15.006.30279 / 15.023.20053' +\n '\\n';\n security_report_v4(port:port, extra:report, severity:SECURITY_HOLE);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, verui, path);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-17T14:22:55", "description": "The version of Adobe Reader installed on the remote Windows host is prior to 11.0.19, 15.006.30279, or 15.023.20053. It is, therefore, affected by multiple vulnerabilities :\n\n - Multiple memory corruption issues exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941, CVE-2017-2943, CVE-2017-2944, CVE-2017-2953, CVE-2017-2954)\n\n - Multiple heap buffer overflow conditions exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2942, CVE-2017-2945, CVE-2017-2959)\n\n - A heap buffer overflow condition exists when handling JPEG2000 images due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to execute arbitrary code.\n (CVE-2017-2946)\n\n - An unspecified security bypass vulnerability exists that allows an unauthenticated, remote attacker to have an unspecified impact. (CVE-2017-2947)\n\n - Multiple overflow conditions exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2948, CVE-2017-2952)\n\n - A heap buffer overflow condition exists when handling the XSLT element-available() function that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2949)\n\n - Multiple use-after-free memory errors exist when handling XFA subform layouts, hyphenation objects, field font sizes, and template objects. An unauthenticated, remote attacker can exploit these to execute arbitrary code.\n (CVE-2017-2950, CVE-2017-2951, CVE-2017-2961, CVE-2017-2967)\n\n - Multiple use-after-free memory errors exist that allow an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2955, CVE-2017-2956, CVE-2017-2957, CVE-2017-2958)\n\n - Multiple memory corruption issues exist when handling JPEG and TIFF files due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code.\n (CVE-2017-2960, CVE-2017-2963, CVE-2017-2964, CVE-2017-2965)\n\n - A type confusion error exists when handling the XSLT lang() function that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2962)\n\n - A heap buffer overflow condition exists in the ImageConversion component when handling TIFF images() due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2017-2966)\n\n - A buffer overflow condition exists in the JPEG2000 parser due to improper validation of unspecified input.\n An unauthenticated, remote attacker can exploit this to disclose sensitive information. (CVE-2017-3009)\n\n - A memory corruption issue exists in the Rendering engine due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-3010)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-01-12T00:00:00", "type": "nessus", "title": "Adobe Reader < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-2939", "CVE-2017-2940", "CVE-2017-2941", "CVE-2017-2942", "CVE-2017-2943", "CVE-2017-2944", "CVE-2017-2945", "CVE-2017-2946", "CVE-2017-2947", "CVE-2017-2948", "CVE-2017-2949", "CVE-2017-2950", "CVE-2017-2951", "CVE-2017-2952", "CVE-2017-2953", "CVE-2017-2954", "CVE-2017-2955", "CVE-2017-2956", "CVE-2017-2957", "CVE-2017-2958", "CVE-2017-2959", "CVE-2017-2960", "CVE-2017-2961", "CVE-2017-2962", "CVE-2017-2963", "CVE-2017-2964", "CVE-2017-2965", "CVE-2017-2966", "CVE-2017-2967", "CVE-2017-3009", "CVE-2017-3010"], "modified": "2019-11-13T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "ADOBE_READER_APSB17-01.NASL", "href": "https://www.tenable.com/plugins/nessus/96453", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(96453);\n script_version(\"1.11\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2017-2939\",\n \"CVE-2017-2940\",\n \"CVE-2017-2941\",\n \"CVE-2017-2942\",\n \"CVE-2017-2943\",\n \"CVE-2017-2944\",\n \"CVE-2017-2945\",\n \"CVE-2017-2946\",\n \"CVE-2017-2947\",\n \"CVE-2017-2948\",\n \"CVE-2017-2949\",\n \"CVE-2017-2950\",\n \"CVE-2017-2951\",\n \"CVE-2017-2952\",\n \"CVE-2017-2953\",\n \"CVE-2017-2954\",\n \"CVE-2017-2955\",\n \"CVE-2017-2956\",\n \"CVE-2017-2957\",\n \"CVE-2017-2958\",\n \"CVE-2017-2959\",\n \"CVE-2017-2960\",\n \"CVE-2017-2961\",\n \"CVE-2017-2962\",\n \"CVE-2017-2963\",\n \"CVE-2017-2964\",\n \"CVE-2017-2965\",\n \"CVE-2017-2966\",\n \"CVE-2017-2967\",\n \"CVE-2017-3009\",\n \"CVE-2017-3010\"\n );\n script_bugtraq_id(\n 95340,\n 95343,\n 95344,\n 95345,\n 95346,\n 95348,\n 97302,\n 97306\n );\n\n script_name(english:\"Adobe Reader < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01)\");\n script_summary(english:\"Checks the version of Adobe Reader.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote Windows host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote Windows host is\nprior to 11.0.19, 15.006.30279, or 15.023.20053. It is, therefore,\naffected by multiple vulnerabilities :\n\n - Multiple memory corruption issues exist due to improper\n validation of unspecified input. An unauthenticated,\n remote attacker can exploit these to execute arbitrary\n code. (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941,\n CVE-2017-2943, CVE-2017-2944, CVE-2017-2953,\n CVE-2017-2954)\n\n - Multiple heap buffer overflow conditions exist due to\n improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit these to\n execute arbitrary code. (CVE-2017-2942, CVE-2017-2945,\n CVE-2017-2959)\n\n - A heap buffer overflow condition exists when handling\n JPEG2000 images due to improper validation of\n unspecified input. An unauthenticated, remote attacker\n can exploit this to execute arbitrary code.\n (CVE-2017-2946)\n\n - An unspecified security bypass vulnerability exists that\n allows an unauthenticated, remote attacker to have an\n unspecified impact. (CVE-2017-2947)\n\n - Multiple overflow conditions exist due to improper\n validation of unspecified input. An unauthenticated,\n remote attacker can exploit these to execute arbitrary\n code. (CVE-2017-2948, CVE-2017-2952)\n\n - A heap buffer overflow condition exists when handling\n the XSLT element-available() function that allows an\n unauthenticated, remote attacker to execute arbitrary\n code. (CVE-2017-2949)\n\n - Multiple use-after-free memory errors exist when handling\n XFA subform layouts, hyphenation objects, field font\n sizes, and template objects. An unauthenticated, remote\n attacker can exploit these to execute arbitrary code.\n (CVE-2017-2950, CVE-2017-2951, CVE-2017-2961,\n CVE-2017-2967)\n\n - Multiple use-after-free memory errors exist that allow\n an unauthenticated, remote attacker to execute arbitrary\n code. (CVE-2017-2955, CVE-2017-2956, CVE-2017-2957,\n CVE-2017-2958)\n\n - Multiple memory corruption issues exist when handling\n JPEG and TIFF files due to improper validation of\n unspecified input. An unauthenticated, remote attacker\n can exploit these to execute arbitrary code.\n (CVE-2017-2960, CVE-2017-2963, CVE-2017-2964,\n CVE-2017-2965)\n\n - A type confusion error exists when handling the XSLT\n lang() function that allows an unauthenticated, remote\n attacker to execute arbitrary code. (CVE-2017-2962)\n\n - A heap buffer overflow condition exists in the\n ImageConversion component when handling TIFF images()\n due to improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit this to\n execute arbitrary code. (CVE-2017-2966)\n\n - A buffer overflow condition exists in the JPEG2000\n parser due to improper validation of unspecified input.\n An unauthenticated, remote attacker can exploit this to\n disclose sensitive information. (CVE-2017-3009)\n\n - A memory corruption issue exists in the Rendering engine\n due to improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-3010)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader version 11.0.19 / 15.006.30279 / 15.023.20053\nor later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-3010\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_reader_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\n\napp_name = \"Adobe Reader\";\ninstall = get_single_install(app_name:app_name);\n\nversion = install['version'];\npath = install['path'];\nverui = install['display_version'];\n\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\n# Affected is :\n#\n# 11.x < 11.0.19\n# DC Classic < 15.006.30279\n# DC Continuous < 15.023.20053\nif (\n (ver[0] == 11 && ver[1] == 0 && ver[2] <= 18) ||\n (ver[0] == 15 && ver[1] == 6 && ver[2] <= 30244) ||\n (ver[0] == 15 && ver[1] >= 7 && ver[1] <= 19) ||\n (ver[0] == 15 && ver[1] == 20 && ver[2] <= 20042)\n)\n{\n port = get_kb_item('SMB/transport');\n if(!port) port = 445;\n\n report = '\\n Path : '+path+\n '\\n Installed version : '+verui+\n '\\n Fixed version : 11.0.19 / 15.006.30279 / 15.023.20053' +\n '\\n';\n security_report_v4(port:port, extra:report, severity:SECURITY_HOLE);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, verui, path);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-17T14:22:56", "description": "The version of Adobe Reader installed on the remote macOS or Mac OS X host is prior to 11.0.19, 15.006.30279, or 15.023.20053. It is, therefore, affected by multiple vulnerabilities :\n\n - Multiple memory corruption issues exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941, CVE-2017-2943, CVE-2017-2944, CVE-2017-2953, CVE-2017-2954)\n\n - Multiple heap buffer overflow conditions exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2942, CVE-2017-2945, CVE-2017-2959)\n\n - A heap buffer overflow condition exists when handling JPEG2000 images due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to execute arbitrary code.\n (CVE-2017-2946)\n\n - An unspecified security bypass vulnerability exists that allows an unauthenticated, remote attacker to have an unspecified impact. (CVE-2017-2947)\n\n - Multiple overflow conditions exist due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code. (CVE-2017-2948, CVE-2017-2952)\n\n - A heap buffer overflow condition exists when handling the XSLT element-available() function that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2949)\n\n - Multiple use-after-free memory errors exist when handling XFA subform layouts, hyphenation objects, field font sizes, and template objects. An unauthenticated, remote attacker can exploit these to execute arbitrary code.\n (CVE-2017-2950, CVE-2017-2951, CVE-2017-2961, CVE-2017-2967)\n\n - Multiple use-after-free memory errors exist that allow an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2955, CVE-2017-2956, CVE-2017-2957, CVE-2017-2958)\n\n - Multiple memory corruption issues exist when handling JPEG and TIFF files due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit these to execute arbitrary code.\n (CVE-2017-2960, CVE-2017-2963, CVE-2017-2964, CVE-2017-2965)\n\n - A type confusion error exists when handling the XSLT lang() function that allows an unauthenticated, remote attacker to execute arbitrary code. (CVE-2017-2962)\n\n - A heap buffer overflow condition exists in the ImageConversion component when handling TIFF images() due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to execute arbitrary code. (CVE-2017-2966)\n\n - A buffer overflow condition exists in the JPEG2000 parser due to improper validation of unspecified input.\n An unauthenticated, remote attacker can exploit this to disclose sensitive information. (CVE-2017-3009)\n\n - A memory corruption issue exists in the Rendering engine due to improper validation of unspecified input. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2017-3010)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-01-12T00:00:00", "type": "nessus", "title": "Adobe Reader < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-2939", "CVE-2017-2940", "CVE-2017-2941", "CVE-2017-2942", "CVE-2017-2943", "CVE-2017-2944", "CVE-2017-2945", "CVE-2017-2946", "CVE-2017-2947", "CVE-2017-2948", "CVE-2017-2949", "CVE-2017-2950", "CVE-2017-2951", "CVE-2017-2952", "CVE-2017-2953", "CVE-2017-2954", "CVE-2017-2955", "CVE-2017-2956", "CVE-2017-2957", "CVE-2017-2958", "CVE-2017-2959", "CVE-2017-2960", "CVE-2017-2961", "CVE-2017-2962", "CVE-2017-2963", "CVE-2017-2964", "CVE-2017-2965", "CVE-2017-2966", "CVE-2017-2967", "CVE-2017-3009", "CVE-2017-3010"], "modified": "2019-11-13T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "MACOSX_ADOBE_READER_APSB17-01.NASL", "href": "https://www.tenable.com/plugins/nessus/96455", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(96455);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2017-2939\",\n \"CVE-2017-2940\",\n \"CVE-2017-2941\",\n \"CVE-2017-2942\",\n \"CVE-2017-2943\",\n \"CVE-2017-2944\",\n \"CVE-2017-2945\",\n \"CVE-2017-2946\",\n \"CVE-2017-2947\",\n \"CVE-2017-2948\",\n \"CVE-2017-2949\",\n \"CVE-2017-2950\",\n \"CVE-2017-2951\",\n \"CVE-2017-2952\",\n \"CVE-2017-2953\",\n \"CVE-2017-2954\",\n \"CVE-2017-2955\",\n \"CVE-2017-2956\",\n \"CVE-2017-2957\",\n \"CVE-2017-2958\",\n \"CVE-2017-2959\",\n \"CVE-2017-2960\",\n \"CVE-2017-2961\",\n \"CVE-2017-2962\",\n \"CVE-2017-2963\",\n \"CVE-2017-2964\",\n \"CVE-2017-2965\",\n \"CVE-2017-2966\",\n \"CVE-2017-2967\",\n \"CVE-2017-3009\",\n \"CVE-2017-3010\"\n );\n script_bugtraq_id(\n 95340,\n 95343,\n 95344,\n 95345,\n 95346,\n 95348,\n 97302,\n 97306\n );\n\n script_name(english:\"Adobe Reader < 11.0.19 / 15.006.30279 / 15.023.20053 Multiple Vulnerabilities (APSB17-01) (macOS)\");\n script_summary(english:\"Checks the version of Adobe Reader.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote macOS or Mac OS X\nhost is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote macOS or Mac OS X\nhost is prior to 11.0.19, 15.006.30279, or 15.023.20053. It is,\ntherefore, affected by multiple vulnerabilities :\n\n - Multiple memory corruption issues exist due to improper\n validation of unspecified input. An unauthenticated,\n remote attacker can exploit these to execute arbitrary\n code. (CVE-2017-2939, CVE-2017-2940, CVE-2017-2941,\n CVE-2017-2943, CVE-2017-2944, CVE-2017-2953,\n CVE-2017-2954)\n\n - Multiple heap buffer overflow conditions exist due to\n improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit these to\n execute arbitrary code. (CVE-2017-2942, CVE-2017-2945,\n CVE-2017-2959)\n\n - A heap buffer overflow condition exists when handling\n JPEG2000 images due to improper validation of\n unspecified input. An unauthenticated, remote attacker\n can exploit this to execute arbitrary code.\n (CVE-2017-2946)\n\n - An unspecified security bypass vulnerability exists that\n allows an unauthenticated, remote attacker to have an\n unspecified impact. (CVE-2017-2947)\n\n - Multiple overflow conditions exist due to improper\n validation of unspecified input. An unauthenticated,\n remote attacker can exploit these to execute arbitrary\n code. (CVE-2017-2948, CVE-2017-2952)\n\n - A heap buffer overflow condition exists when handling\n the XSLT element-available() function that allows an\n unauthenticated, remote attacker to execute arbitrary\n code. (CVE-2017-2949)\n\n - Multiple use-after-free memory errors exist when handling\n XFA subform layouts, hyphenation objects, field font\n sizes, and template objects. An unauthenticated, remote\n attacker can exploit these to execute arbitrary code.\n (CVE-2017-2950, CVE-2017-2951, CVE-2017-2961,\n CVE-2017-2967)\n\n - Multiple use-after-free memory errors exist that allow\n an unauthenticated, remote attacker to execute arbitrary\n code. (CVE-2017-2955, CVE-2017-2956, CVE-2017-2957,\n CVE-2017-2958)\n\n - Multiple memory corruption issues exist when handling\n JPEG and TIFF files due to improper validation of\n unspecified input. An unauthenticated, remote attacker\n can exploit these to execute arbitrary code.\n (CVE-2017-2960, CVE-2017-2963, CVE-2017-2964,\n CVE-2017-2965)\n\n - A type confusion error exists when handling the XSLT\n lang() function that allows an unauthenticated, remote\n attacker to execute arbitrary code. (CVE-2017-2962)\n\n - A heap buffer overflow condition exists in the\n ImageConversion component when handling TIFF images()\n due to improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit this to\n execute arbitrary code. (CVE-2017-2966)\n\n - A buffer overflow condition exists in the JPEG2000\n parser due to improper validation of unspecified input.\n An unauthenticated, remote attacker can exploit this to\n disclose sensitive information. (CVE-2017-3009)\n\n - A memory corruption issue exists in the Rendering engine\n due to improper validation of unspecified input. An\n unauthenticated, remote attacker can exploit this to\n cause a denial of service condition or the execution of\n arbitrary code. (CVE-2017-3010)\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader version 11.0.19 / 15.006.30279 / 15.023.20053 \nor later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-3010\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/01/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_reader_installed.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\nget_kb_item_or_exit(\"Host/local_checks_enabled\");\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\napp_name = \"Adobe Reader\";\ninstall = get_single_install(app_name:app_name);\n\nversion = install['version'];\npath = install['path'];\n\nver = split(version, sep:'.', keep:FALSE);\nfor (i=0; i<max_index(ver); i++)\n ver[i] = int(ver[i]);\n\n# Affected is :\n#\n# 11.x < 11.0.19\n# DC Classic < 15.006.30279\n# DC Continuous < 15.023.20053\nif (\n (ver[0] == 11 && ver[1] == 0 && ver[2] <= 18) ||\n (ver[0] == 15 && ver[1] == 6 && ver[2] <= 30244) ||\n (ver[0] == 15 && ver[1] >= 7 && ver[1] <= 19) ||\n (ver[0] == 15 && ver[1] == 20 && ver[2] <= 20042)\n)\n{\n report = '\\n Path : '+path+\n '\\n Installed version : '+version+\n '\\n Fixed version : 11.0.19 / 15.006.30279 / 15.023.20053' +\n '\\n';\n security_report_v4(port:0, extra:report, severity:SECURITY_HOLE);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n", "cvss": {"score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2019-07-17T14:21:29", "description": "This host is installed with Adobe Reader\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2017-01-11T00:00:00", "type": "openvas", "title": "Adobe Reader Security Updates(apsb17-01)-Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-2964", "CVE-2017-2962", "CVE-2017-2943", "CVE-2017-2965", "CVE-2017-2947", "CVE-2017-2971", "CVE-2017-2946", "CVE-2017-2961", "CVE-2017-2954", "CVE-2017-3010", "CVE-2017-2956", "CVE-2017-2966", "CVE-2017-2959", "CVE-2017-2951", "CVE-2017-3009", "CVE-2017-2957", "CVE-2017-2960", "CVE-2017-2942", "CVE-2017-2955", "CVE-2017-2941", "CVE-2017-2967", "CVE-2017-2950", "CVE-2017-2945", "CVE-2017-2958", "CVE-2017-2939", "CVE-2017-2970", "CVE-2017-2949", "CVE-2017-2940", "CVE-2017-2944", "CVE-2017-2953", "CVE-2017-2952", "CVE-2017-2972", "CVE-2017-2948", "CVE-2017-2963"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310810334", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810334", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Reader Security Updates(apsb17-01)-Windows\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810334\");\n script_version(\"2019-07-05T08:56:43+0000\");\n script_cve_id(\"CVE-2017-2939\", \"CVE-2017-2940\", \"CVE-2017-2941\", \"CVE-2017-2942\",\n \"CVE-2017-2943\", \"CVE-2017-2944\", \"CVE-2017-2945\", \"CVE-2017-2946\",\n \"CVE-2017-2947\", \"CVE-2017-2948\", \"CVE-2017-2949\", \"CVE-2017-2950\",\n \"CVE-2017-2951\", \"CVE-2017-2952\", \"CVE-2017-2953\", \"CVE-2017-2954\",\n \"CVE-2017-2955\", \"CVE-2017-2956\", \"CVE-2017-2957\", \"CVE-2017-2958\",\n \"CVE-2017-2959\", \"CVE-2017-2960\", \"CVE-2017-2961\", \"CVE-2017-2962\",\n \"CVE-2017-2963\", \"CVE-2017-2964\", \"CVE-2017-2965\", \"CVE-2017-2966\",\n \"CVE-2017-2967\", \"CVE-2017-2970\", \"CVE-2017-2971\", \"CVE-2017-2972\",\n \"CVE-2017-3009\", \"CVE-2017-3010\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:56:43 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-01-11 08:28:14 +0530 (Wed, 11 Jan 2017)\");\n script_name(\"Adobe Reader Security Updates(apsb17-01)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Reader\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - A type confusion vulnerability.\n\n - An use-after-free vulnerabilities.\n\n - The heap buffer overflow vulnerabilities.\n\n - The buffer overflow vulnerabilities.\n\n - The memory corruption vulnerabilities.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to do code execution,\n security bypass and information disclosure.\");\n\n script_tag(name:\"affected\", value:\"Adobe Reader version 11.x before\n 11.0.19 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Reader version\n 11.0.19 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Reader/Win/Installed\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!readerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:readerVer, test_version:\"11.0\", test_version2:\"11.0.18\"))\n{\n report = report_fixed_ver(installed_version:readerVer, fixed_version:\"11.0.19\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:19:28", "description": "This host is installed with Adobe Acrobat\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2017-01-11T00:00:00", "type": "openvas", "title": "Adobe Acrobat Security Updates(apsb17-01)-Windows", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-2964", "CVE-2017-2962", "CVE-2017-2943", "CVE-2017-2965", "CVE-2017-2947", "CVE-2017-2971", "CVE-2017-2946", "CVE-2017-2961", "CVE-2017-2954", "CVE-2017-3010", "CVE-2017-2956", "CVE-2017-2966", "CVE-2017-2959", "CVE-2017-2951", "CVE-2017-3009", "CVE-2017-2957", "CVE-2017-2960", "CVE-2017-2942", "CVE-2017-2955", "CVE-2017-2941", "CVE-2017-2967", "CVE-2017-2950", "CVE-2017-2945", "CVE-2017-2958", "CVE-2017-2939", "CVE-2017-2970", "CVE-2017-2949", "CVE-2017-2940", "CVE-2017-2944", "CVE-2017-2953", "CVE-2017-2952", "CVE-2017-2972", "CVE-2017-2948", "CVE-2017-2963"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310810332", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810332", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat Security Updates(apsb17-01)-Windows\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810332\");\n script_version(\"2019-07-05T08:56:43+0000\");\n script_cve_id(\"CVE-2017-2939\", \"CVE-2017-2940\", \"CVE-2017-2941\", \"CVE-2017-2942\",\n \"CVE-2017-2943\", \"CVE-2017-2944\", \"CVE-2017-2945\", \"CVE-2017-2946\",\n \"CVE-2017-2947\", \"CVE-2017-2948\", \"CVE-2017-2949\", \"CVE-2017-2950\",\n \"CVE-2017-2951\", \"CVE-2017-2952\", \"CVE-2017-2953\", \"CVE-2017-2954\",\n \"CVE-2017-2955\", \"CVE-2017-2956\", \"CVE-2017-2957\", \"CVE-2017-2958\",\n \"CVE-2017-2959\", \"CVE-2017-2960\", \"CVE-2017-2961\", \"CVE-2017-2962\",\n \"CVE-2017-2963\", \"CVE-2017-2964\", \"CVE-2017-2965\", \"CVE-2017-2966\",\n \"CVE-2017-2967\", \"CVE-2017-2970\", \"CVE-2017-2971\", \"CVE-2017-2972\",\n \"CVE-2017-3009\", \"CVE-2017-3010\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:56:43 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-01-11 08:28:14 +0530 (Wed, 11 Jan 2017)\");\n script_name(\"Adobe Acrobat Security Updates(apsb17-01)-Windows\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - A type confusion vulnerability.\n\n - An use-after-free vulnerabilities.\n\n - The heap buffer overflow vulnerabilities.\n\n - The buffer overflow vulnerabilities.\n\n - The memory corruption vulnerabilities.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to do code execution,\n security bypass and information disclosure.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat version 11.x before\n 11.0.19 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat version\n 11.0.19 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"registry\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_win.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/Win/Installed\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!readerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:readerVer, test_version:\"11.0\", test_version2:\"11.0.18\"))\n{\n report = report_fixed_ver(installed_version:readerVer, fixed_version:\"11.0.19\");\n security_message(data:report);\n exit(0);\n}", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:20:34", "description": "This host is installed with Adobe Acrobat\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2017-01-11T00:00:00", "type": "openvas", "title": "Adobe Acrobat Security Updates(apsb17-01)-MAC OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-2964", "CVE-2017-2962", "CVE-2017-2943", "CVE-2017-2965", "CVE-2017-2947", "CVE-2017-2971", "CVE-2017-2946", "CVE-2017-2961", "CVE-2017-2954", "CVE-2017-3010", "CVE-2017-2956", "CVE-2017-2966", "CVE-2017-2959", "CVE-2017-2951", "CVE-2017-3009", "CVE-2017-2957", "CVE-2017-2960", "CVE-2017-2942", "CVE-2017-2955", "CVE-2017-2941", "CVE-2017-2967", "CVE-2017-2950", "CVE-2017-2945", "CVE-2017-2958", "CVE-2017-2939", "CVE-2017-2970", "CVE-2017-2949", "CVE-2017-2940", "CVE-2017-2944", "CVE-2017-2953", "CVE-2017-2952", "CVE-2017-2972", "CVE-2017-2948", "CVE-2017-2963"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310810333", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810333", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Acrobat Security Updates(apsb17-01)-MAC OS X\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810333\");\n script_version(\"2019-07-05T08:56:43+0000\");\n script_cve_id(\"CVE-2017-2939\", \"CVE-2017-2940\", \"CVE-2017-2941\", \"CVE-2017-2942\",\n \"CVE-2017-2943\", \"CVE-2017-2944\", \"CVE-2017-2945\", \"CVE-2017-2946\",\n \"CVE-2017-2947\", \"CVE-2017-2948\", \"CVE-2017-2949\", \"CVE-2017-2950\",\n \"CVE-2017-2951\", \"CVE-2017-2952\", \"CVE-2017-2953\", \"CVE-2017-2954\",\n \"CVE-2017-2955\", \"CVE-2017-2956\", \"CVE-2017-2957\", \"CVE-2017-2958\",\n \"CVE-2017-2959\", \"CVE-2017-2960\", \"CVE-2017-2961\", \"CVE-2017-2962\",\n \"CVE-2017-2963\", \"CVE-2017-2964\", \"CVE-2017-2965\", \"CVE-2017-2966\",\n \"CVE-2017-2967\", \"CVE-2017-2970\", \"CVE-2017-2971\", \"CVE-2017-2972\",\n \"CVE-2017-3009\", \"CVE-2017-3010\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:56:43 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-01-11 08:28:14 +0530 (Wed, 11 Jan 2017)\");\n script_name(\"Adobe Acrobat Security Updates(apsb17-01)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Acrobat\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - A type confusion vulnerability.\n\n - An use-after-free vulnerabilities.\n\n - The heap buffer overflow vulnerabilities.\n\n - The buffer overflow vulnerabilities.\n\n - The memory corruption vulnerabilities.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to do code execution,\n security bypass and information disclosure.\");\n\n script_tag(name:\"affected\", value:\"Adobe Acrobat version 11.x before\n 11.0.19 on MAC OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Acrobat version\n 11.0.19 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Acrobat/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!readerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:readerVer, test_version:\"11.0\", test_version2:\"11.0.18\"))\n{\n report = report_fixed_ver(installed_version:readerVer, fixed_version:\"11.0.19\");\n security_message(data:report);\n exit(0);\n}", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-07-17T14:19:02", "description": "This host is installed with Adobe Reader\n and is prone to multiple vulnerabilities.", "cvss3": {}, "published": "2017-01-11T00:00:00", "type": "openvas", "title": "Adobe Reader Security Updates(apsb17-01)-MAC OS X", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-2964", "CVE-2017-2962", "CVE-2017-2943", "CVE-2017-2965", "CVE-2017-2947", "CVE-2017-2971", "CVE-2017-2946", "CVE-2017-2961", "CVE-2017-2954", "CVE-2017-3010", "CVE-2017-2956", "CVE-2017-2966", "CVE-2017-2959", "CVE-2017-2951", "CVE-2017-3009", "CVE-2017-2957", "CVE-2017-2960", "CVE-2017-2942", "CVE-2017-2955", "CVE-2017-2941", "CVE-2017-2967", "CVE-2017-2950", "CVE-2017-2945", "CVE-2017-2958", "CVE-2017-2939", "CVE-2017-2970", "CVE-2017-2949", "CVE-2017-2940", "CVE-2017-2944", "CVE-2017-2953", "CVE-2017-2952", "CVE-2017-2972", "CVE-2017-2948", "CVE-2017-2963"], "modified": "2019-07-05T00:00:00", "id": "OPENVAS:1361412562310810335", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810335", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Adobe Reader Security Updates(apsb17-01)-MAC OS X\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2017 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:adobe:acrobat_reader\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810335\");\n script_version(\"2019-07-05T08:56:43+0000\");\n script_cve_id(\"CVE-2017-2939\", \"CVE-2017-2940\", \"CVE-2017-2941\", \"CVE-2017-2942\",\n \"CVE-2017-2943\", \"CVE-2017-2944\", \"CVE-2017-2945\", \"CVE-2017-2946\",\n \"CVE-2017-2947\", \"CVE-2017-2948\", \"CVE-2017-2949\", \"CVE-2017-2950\",\n \"CVE-2017-2951\", \"CVE-2017-2952\", \"CVE-2017-2953\", \"CVE-2017-2954\",\n \"CVE-2017-2955\", \"CVE-2017-2956\", \"CVE-2017-2957\", \"CVE-2017-2958\",\n \"CVE-2017-2959\", \"CVE-2017-2960\", \"CVE-2017-2961\", \"CVE-2017-2962\",\n \"CVE-2017-2963\", \"CVE-2017-2964\", \"CVE-2017-2965\", \"CVE-2017-2966\",\n \"CVE-2017-2967\", \"CVE-2017-2970\", \"CVE-2017-2971\", \"CVE-2017-2972\",\n \"CVE-2017-3009\", \"CVE-2017-3010\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 08:56:43 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2017-01-11 08:28:14 +0530 (Wed, 11 Jan 2017)\");\n script_name(\"Adobe Reader Security Updates(apsb17-01)-MAC OS X\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Adobe Reader\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws exists due to,\n\n - A type confusion vulnerability.\n\n - An use-after-free vulnerabilities.\n\n - The heap buffer overflow vulnerabilities.\n\n - The buffer overflow vulnerabilities.\n\n - The memory corruption vulnerabilities.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation of these\n vulnerabilities will allow remote attackers to do code execution,\n security bypass and information disclosure.\");\n\n script_tag(name:\"affected\", value:\"Adobe Reader version 11.x before\n 11.0.19 on MAC OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Adobe Reader version\n 11.0.19 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb17-01.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2017 Greenbone Networks GmbH\");\n script_family(\"General\");\n script_dependencies(\"secpod_adobe_prdts_detect_macosx.nasl\");\n script_mandatory_keys(\"Adobe/Reader/MacOSX/Version\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!readerVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_in_range(version:readerVer, test_version:\"11.0\", test_version2:\"11.0.18\"))\n{\n report = report_fixed_ver(installed_version:readerVer, fixed_version:\"11.0.19\");\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2021-08-18T11:19:15", "description": "### *Detect date*:\n01/05/2017\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Adobe Acrobat and Adobe Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code or bypass security restrictions.\n\n### *Affected products*:\nAdobe Reader XI 11.0.18 and earlier versions \nAdobe Acrobat XI 11.0.18 and earlier versions \nAdobe Acrobat DC Classic 15.006.30244 and earlier versions \nAdobe Acrobat DC Continuous 15.020.20042 and earlier versions \nAdobe Acrobat Reader DC Classic 15.006.30244 and earlier versions \nAdobe Acrobat Reader DC Continuous 15.020.20042 and earlier versions \n\n### *Solution*:\nUpdate to the latest version \n[Get Adobe Acrobat DC](<http://supportdownloads.adobe.com/product.jsp?product=1&platform=Windows>) \n[Get Adobe Acrobat Reader DC](<https://get.adobe.com/reader/>) \n[Get Adobe Reader XI](<http://supportdownloads.adobe.com/product.jsp?product=10&platform=Windows>)\n\n### *Original advisories*:\n[APSB17-01](<https://helpx.adobe.com/security/products/acrobat/apsb17-01.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Reader XI](<https://threats.kaspersky.com/en/product/Adobe-Reader-XI/>)\n\n### *CVE-IDS*:\n[CVE-2017-2939](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2939>)9.3Critical \n[CVE-2017-2940](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2940>)9.3Critical \n[CVE-2017-2941](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2941>)9.3Critical \n[CVE-2017-2942](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2942>)9.3Critical \n[CVE-2017-2943](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2943>)9.3Critical \n[CVE-2017-2944](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2944>)9.3Critical \n[CVE-2017-2945](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2945>)9.3Critical \n[CVE-2017-2946](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2946>)9.3Critical \n[CVE-2017-2947](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2947>)4.3Warning \n[CVE-2017-2948](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2948>)9.3Critical \n[CVE-2017-2972](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2972>)9.3Critical \n[CVE-2017-2971](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2971>)9.3Critical \n[CVE-2017-2970](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2970>)9.3Critical \n[CVE-2017-2967](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2967>)9.3Critical \n[CVE-2017-2966](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2966>)9.3Critical \n[CVE-2017-2965](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2965>)9.3Critical \n[CVE-2017-2964](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2964>)9.3Critical \n[CVE-2017-2963](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2963>)9.3Critical \n[CVE-2017-2962](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2962>)9.3Critical \n[CVE-2017-2961](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2961>)9.3Critical \n[CVE-2017-2960](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2960>)9.3Critical \n[CVE-2017-2959](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2959>)9.3Critical \n[CVE-2017-2958](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2958>)9.3Critical \n[CVE-2017-2957](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2957>)9.3Critical \n[CVE-2017-2956](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2956>)9.3Critical \n[CVE-2017-2955](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2955>)9.3Critical \n[CVE-2017-2954](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2954>)9.3Critical \n[CVE-2017-2953](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2953>)9.3Critical \n[CVE-2017-2952](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2952>)9.3Critical \n[CVE-2017-2951](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2951>)9.3Critical \n[CVE-2017-2950](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2950>)9.3Critical \n[CVE-2017-2949](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2949>)9.3Critical\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-01-05T00:00:00", "type": "kaspersky", "title": "KLA10935 Multiple vulnerabilities in Adobe Acrobat and Adobe Reader", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-2939", "CVE-2017-2940", "CVE-2017-2941", "CVE-2017-2942", "CVE-2017-2943", "CVE-2017-2944", "CVE-2017-2945", "CVE-2017-2946", "CVE-2017-2947", "CVE-2017-2948", "CVE-2017-2949", "CVE-2017-2950", "CVE-2017-2951", "CVE-2017-2952", "CVE-2017-2953", "CVE-2017-2954", "CVE-2017-2955", "CVE-2017-2956", "CVE-2017-2957", "CVE-2017-2958", "CVE-2017-2959", "CVE-2017-2960", "CVE-2017-2961", "CVE-2017-2962", "CVE-2017-2963", "CVE-2017-2964", "CVE-2017-2965", "CVE-2017-2966", "CVE-2017-2967", "CVE-2017-2970", "CVE-2017-2971", "CVE-2017-2972"], "modified": "2020-06-18T00:00:00", "id": "KLA10935", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10935/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "adobe": [{"lastseen": "2021-09-30T17:39:51", "description": "Adobe has released security updates for Adobe Acrobat and Reader for Windows and Macintosh. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 9.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2017-01-05T00:00:00", "type": "adobe", "title": "APSB17-01 Security Updates Available for Adobe Acrobat and Reader", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 10.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": true, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-2939", "CVE-2017-2940", "CVE-2017-2941", "CVE-2017-2942", "CVE-2017-2943", "CVE-2017-2944", "CVE-2017-2945", "CVE-2017-2946", "CVE-2017-2947", "CVE-2017-2948", "CVE-2017-2949", "CVE-2017-2950", "CVE-2017-2951", "CVE-2017-2952", "CVE-2017-2953", "CVE-2017-2954", "CVE-2017-2955", "CVE-2017-2956", "CVE-2017-2957", "CVE-2017-2958", "CVE-2017-2959", "CVE-2017-2960", "CVE-2017-2961", "CVE-2017-2962", "CVE-2017-2963", "CVE-2017-2964", "CVE-2017-2965", "CVE-2017-2966", "CVE-2017-2967", "CVE-2017-2970", "CVE-2017-2971", "CVE-2017-2972", "CVE-2017-3009", "CVE-2017-3010"], "modified": "2017-02-16T00:00:00", "id": "APSB17-01", "href": "https://helpx.adobe.com/security/products/acrobat/apsb17-01.html", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}