Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200412-12] Adobe Acrobat Reader: Buffer overflow vulnerability Vulnerability Scan


Vulnerability Scan Summary
Adobe Acrobat Reader: Buffer overflow vulnerability

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200412-12
(Adobe Acrobat Reader: Buffer overflow vulnerability)


A buffer overflow has been discovered in the email processing of
Adobe Acrobat Reader. This flaw exists in the mailListIsPdf function,
which checks if the input file is an email message containing a PDF
file.

Impact

A remote attacker could send the victim a specially-crafted email
and PDF attachment, which would trigger the buffer overflow and
possibly lead to the execution of arbitrary code with the permissions
of the user running Adobe Acrobat Reader.

Workaround

There is no known workaround at this time.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1152
http://www.adobe.com/support/techdocs/331153.html


Solution:
All Adobe Acrobat Reader users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/acroread-5.10"


Threat Level: Medium


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.