Adobe Acrobat 11.0.4 Crafted PDF File Handling JavaScript Scheme URI Execution (APSB13-25)

high Nessus Plugin ID 70342

Synopsis

The version of Adobe Acrobat on the remote Windows host is affected by a JavaScript URI scheme execution vulnerability.

Description

The version of Adobe Acrobat installed on the remote host is 11.0.4. It is, therefore, affected by a flaw in the handling of specially crafted PDF files. This can allow an attacker to launch JavaScript URI schemes.

Solution

Upgrade to Adobe Acrobat 11.0.5 or later.

See Also

https://www.adobe.com/support/security/bulletins/apsb13-25.html

Plugin Details

Severity: High

ID: 70342

File Name: adobe_acrobat_apsb13-25.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 10/9/2013

Updated: 5/31/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-5325

Vulnerability Information

CPE: cpe:/a:adobe:acrobat

Required KB Items: installed_sw/Adobe Acrobat

Exploit Ease: No known exploits are available

Patch Publication Date: 10/8/2013

Vulnerability Publication Date: 10/8/2013

Reference Information

CVE: CVE-2013-5325

BID: 62888