Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks version of nppdf32.dll
Detailed Explanation for this Vulnerability Assessment
The browser test on the remote Windows host is affected by multiple
The version of Adobe PDF Plug-In installed on the remote host is
earlier than 7.0.9 / 8.0 and reportedly fails to properly sanitize
input to the 'FDF', 'XML', or 'XFDF' fields used by its 'Open
Parameters' feature. By tricking a user to access a specially-crafted
link and depending on the browser with which the test is used, a
remote attacker may be able to leverage these issues to conduct
arbitrary code execution, denial of service, cross-site script
forgery, or cross-site scripting attacks against a user on the remote
See also :
Either disable displaying of PDF documents in web browsers or upgrade
to Adobe Reader / Acrobat 8.0 / 7.0.9 or later.
Network Security Threat Level:
High / CVSS Base Score : 7.0
Networks Security ID: 21858
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security
|Apple AirPort Time Capsule 3 TB Wireless WIFI Router Hard Drive - ME182LL/A
|Samsung 1TB/1000GB SATA Notebook Laptop 2.5" Internal Hard Drive
|Seagate Firecuda Gaming 1TB 2.5-Inch SATA 6GB/s 5400rpm 128 MB Cache Internal...
No Discussions have been posted on this vulnerability.