VID |
50358 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The version of Adobe Acrobat installed on the remote Windows host is a version prior to 2017.011.30202, 2020.004.30015, or 2021.007.20091. It is, therefore, affected by multiple vulnerabilities.
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a Buffer Overflow vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39863)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an Uncontrolled Search Path Element vulnerability. An attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user via DLL hijacking. Exploitation of this issue requires user interaction. (CVE-2021-35982)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetIcon action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39836)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm deleteItemAt action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39837)
- Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by a use-after-free vulnerability in the processing of the AcroForm buttonGetCaption action that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-39838) * Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these conditions will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://cwe.mitre.org/data/definitions/121.html https://cwe.mitre.org/data/definitions/200.html https://cwe.mitre.org/data/definitions/125.html https://cwe.mitre.org/data/definitions/416.html https://cwe.mitre.org/data/definitions/122.html https://cwe.mitre.org/data/definitions/476.html https://cwe.mitre.org/data/definitions/787.html https://cwe.mitre.org/data/definitions/843.html https://cwe.mitre.org/data/definitions/427.html https://helpx.adobe.com/security/products/acrobat/apsb21-55.html
* Platforms Affected: Adobe Acrobat versions prior to 2017.011.30202 Microsoft Windows Any version Linux Any version |
Recommendation |
Upgrade to the latest version of Adobe Acrobat (2017.011.30202 or later), as described in the Adobe Security bulletin at https://helpx.adobe.com/security/products/acrobat/apsb21-55.html |
Related URL |
CVE-2021-39843,CVE-2021-39841,CVE-2021-39863,CVE-2021-39857,CVE-2021-39856,CVE-2021-39855,CVE-2021-39844,CVE-2021-39861,CVE-2021-39858 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|