Korean
<< Back
VID 50356
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The version of Adobe Reader installed on the remote Windows host is a version prior to 2017.011.30202, 2020.004.30015, or 2021.007.20091. It is, therefore, affected by multiple vulnerabilities.

- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted PDF file.
An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39863)

- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. An attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user via DLL hijacking. Exploitation of this issue requires user interaction. (CVE-2021-35982)

- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetIcon action that could result in arbitrary code execution in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39836)

- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm deleteItemAt action that could result in arbitrary code execution in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39837)

- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetCaption action that could result in arbitrary code execution in the context of the current user.
Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39838)

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these conditions will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://cwe.mitre.org/data/definitions/121.html
https://cwe.mitre.org/data/definitions/200.html
https://cwe.mitre.org/data/definitions/125.html
https://cwe.mitre.org/data/definitions/416.html
https://cwe.mitre.org/data/definitions/122.html
https://cwe.mitre.org/data/definitions/476.html
https://cwe.mitre.org/data/definitions/787.html
https://cwe.mitre.org/data/definitions/843.html
https://cwe.mitre.org/data/definitions/427.html
https://helpx.adobe.com/security/products/acrobat/apsb21-55.html

* Platforms Affected:
Adobe Reader versions prior to 2020.004.30015
Microsoft Windows Any version
Linux Any version
Recommendation Upgrade to the latest version of Adobe Reader (2020.004.30015 or later), as described in the Adobe Security bulletin at https://helpx.adobe.com/security/products/acrobat/apsb21-55.html
Related URL CVE-2021-39843,CVE-2021-39841,CVE-2021-39863,CVE-2021-39857,CVE-2021-39856,CVE-2021-39855,CVE-2021-39844,CVE-2021-39861,CVE-2021-39858 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)