![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.801305 |
Category: | Denial of Service |
Title: | Adobe Reader PDF Handling Denial Of Service Vulnerability - Linux |
Summary: | Adobe Reader is prone to a denial of service (DoS) vulnerability. |
Description: | Summary: Adobe Reader is prone to a denial of service (DoS) vulnerability. Vulnerability Insight: The flaw is due to an error in 'custom heap management system', allows the attackers to execute arbitrary code via a crafted program that is specified in a PDF document. Vulnerability Impact: Successful exploitation will allow attacker to execute arbitrary code or cause a denial of service via a crafted PDF document. Affected Software/OS: Adobe Reader version 9.3.1 on Linux. Solution: Upgrade to Adobe Reader version 9.3.2 or later. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-1241 BugTraq ID: 39227 http://www.securityfocus.com/bid/39227 BugTraq ID: 39329 http://www.securityfocus.com/bid/39329 Cert/CC Advisory: TA10-103C http://www.us-cert.gov/cas/techalerts/TA10-103C.html http://blog.fortinet.com/the-upcoming-blackhat-europe-2010-presentation/ http://www.blackhat.com/html/bh-eu-10/bh-eu-10-briefings.html#Li http://www.youtube.com/watch?v=9EVHtY1-0q8 http://lists.immunitysec.com/pipermail/dailydave/2010-April/006077.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6940 http://www.vupen.com/english/advisories/2010/0873 XForce ISS Database: reader-customheap-code-execution(57589) https://exchange.xforce.ibmcloud.com/vulnerabilities/57589 |
Copyright | Copyright (C) 2010 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |