Adobe Reader < 11.0.3 / 10.1.7 / 9.5.5 Multiple Vulnerabilities (APSB13-15) (Mac OS X)

critical Nessus Plugin ID 66411

Synopsis

The version of Adobe Reader on the remote Mac OS X host is affected by multiple vulnerabilities.

Description

The version of Adobe Reader installed on the remote Mac OS X host is prior to 11.0.3, 10.1.7, or 9.5.5. It is, therefore, affected by the following vulnerabilities :

- Unspecified memory corruption issues exist that allow an attacker to execute arbitrary code. (CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2732, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, CVE-2013-3341, CVE-2013-3346)

- An integer underflow condition exists that allows an attacker to execute arbitrary code. (CVE-2013-2549)

- A use-after-free error exists that allows an attacker to bypass the Adobe Reader's sandbox protection.
(CVE-2013-2550)

- A flaw exists in the JavaScript API that allows an attacker to obtain sensitive information.
(CVE-2013-2737)

- An unspecified stack overflow condition exists that allows an attacker to execute arbitrary code.
(CVE-2013-2724)

- Multiple unspecified buffer overflow conditions exist that allow an attacker to execute arbitrary code.
(CVE-2013-2730, CVE-2013-2733)

- Multiple unspecified integer overflow conditions exist that allow an attacker to execute arbitrary code.
(CVE-2013-2727, CVE-2013-2729)

- A flaw exists due to improper handling of operating system domain blacklists. An attacker can exploit this to have an unspecified impact. (CVE-2013-3342)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Adobe Reader version 11.0.3 / 10.1.7 / 9.5.5 or later.

See Also

http://www.zerodayinitiative.com/advisories/ZDI-13-212/

http://www.adobe.com/support/security/bulletins/apsb13-15.html

http://www.zerodayinitiative.com/advisories/ZDI-13-105/

http://www.zerodayinitiative.com/advisories/ZDI-13-106/

Plugin Details

Severity: Critical

ID: 66411

File Name: macosx_adobe_reader_apsb13-15.nasl

Version: 1.24

Type: local

Agent: macosx

Published: 5/14/2013

Updated: 3/29/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-3346

Vulnerability Information

CPE: cpe:/a:adobe:acrobat_reader

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, installed_sw/Adobe Reader

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/14/2013

Vulnerability Publication Date: 3/6/2013

CISA Known Exploited Vulnerability Due Dates: 3/24/2022, 4/18/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (AdobeCollabSync Buffer Overflow Adobe Reader X Sandbox Bypass)

Reference Information

CVE: CVE-2013-2549, CVE-2013-2550, CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2724, CVE-2013-2725, CVE-2013-2726, CVE-2013-2727, CVE-2013-2729, CVE-2013-2730, CVE-2013-2731, CVE-2013-2732, CVE-2013-2733, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-2737, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, CVE-2013-3341, CVE-2013-3342, CVE-2013-3346

BID: 59909, 59910, 59911, 59912, 59913, 59914, 59915, 58398, 58568, 59902, 59903, 59904, 59905, 59906, 59907, 59908, 59916, 59917, 59918, 59919, 59920, 59921, 59923, 59925, 59926, 59927, 59930, 62149