Summary
This host is installed with Adobe Reader and is prone to buffer overflow vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary code.
Impact Level: System/Application
Solution
Apply the patch from the below link
ftp://ftp.adobe.com/pub/adobe/acrobat/win/4.x/ac405up2.exe
NOTE : Ignore this warning, if above mentioned patch is already applied.
Insight
The flaw is due to the program fails to validate the '/Registry' and '/Ordering' strings
Affected
Adobe Reader version 4.0.5 and before on Windows.
Detection
Get the installed version with the help of detect NVT and check the version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2000-0713 -
CVSS Base Score: 7.6
AV:N/AC:H/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Active Perl 'Perl_repeatcpy()' Function Buffer Overflow Vulnerability (Windows)
- Adobe Acrobat and Reader SING 'uniqueName' Buffer Overflow Vulnerability (Linux)
- Bopup Communication Server Remote Buffer Overflow Vulnerability
- Advantech Studio Multiple Buffer Overflow Vulnerabilities
- CA eTrust PestPatrol Anti-Spyware 'ppctl.dll' ActiveX Control BOF Vulnerability