VID |
50087 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Adobe Reader installed on the remote host is a version prior to 11.0.14. It is, therefore, affected by multiple vulnerabilities :
- Multiple use-after-free errors exist that allow a remote attacker to execute arbitrary code. (CVE-2016-0932, CVE-2016-0934, CVE-2016-0937, CVE-2016-0940, CVE-2016-0941)
- Multiple memory corruption issues exist that allow a remote attacker to execute arbitrary code. (CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, CVE-2016-0945, CVE-2016-0946)
- A double-free error exists that allows a remote attacker to execute arbitrary code. (CVE-2016-0935)
- A flaw exists in the Global JavaScript API that allows a remote attacker to bypass restrictions and execute arbitrary code. (CVE-2016-0943)
- A flaw exists in the download manager related to the directory search path used to find resources. A remote attacker can exploit this execute arbitrary code. (CVE-2016-0947) * Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these conditions will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://helpx.adobe.com/security/products/reader/apsb16-02.html
* Platforms Affected: Adobe Reader versions prior to 11.0.14 Microsoft Windows Any version Linux Any version |
Recommendation |
Upgrade to the latest version of Adobe Reader (11.0.14 or later), as described in the Adobe Security bulletin at https://helpx.adobe.com/security/products/reader/apsb16-02.html |
Related URL |
CVE-2016-0931,CVE-2016-0932,CVE-2016-0933,CVE-2016-0934,CVE-2016-0935,CVE-2016-0936,CVE-2016-0937,CVE-2016-0938,CVE-2016-0939,CVE-2016-0940 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|