Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-432: acroread


Vulnerability Assessment Details

RHSA-2004-432: acroread

Vulnerability Assessment Summary
Check for the version of the acroread packages

Detailed Explanation for this Vulnerability Assessment


An updated Adobe Acrobat Reader package that fixes multiple security issues
is now available.

The Adobe Acrobat Reader browser permits for the viewing, distributing, and
printing of documents in portable document format (PDF).

iDEFENSE has reported that Adobe Acrobat Reader 5.0 contains a buffer
overflow when decoding uuencoded documents. A possible hacker could execute
arbitrary code on a victim's machine if a user opens a specially crafted
uuencoded document. This issue poses the threat of remote execution, since
Acrobat Reader may be the default handler for PDF files. The Common
Vulnerabilities and Exposures project has assigned the name CVE-2004-0631
to this issue.

iDEFENSE also reported that Adobe Acrobat Reader 5.0 contains an input
validation error in its uuencoding feature. A possible hacker could create a
file with a specially crafted file name which could lead to arbitrary
command execution on a victim's machine. The Common Vulnerabilities and
Exposures project has assigned the name CVE-2004-0630 to this issue.

All users of Acrobat Reader are advised to upgrade to this updated package,
which is not vulnerable to these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2004-432.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors


Dell PowerEdge R720 Server - 2x8c CPU,256Gb RAM, 128Gb SSD/3x900Gb SAS, Proxmox picture

Dell PowerEdge R720 Server - 2x8c CPU,256Gb RAM, 128Gb SSD/3x900Gb SAS, Proxmox

$340.00



Dell Precision T3600 | Xeon E5 | 16GB | GPU | 128GB SSD | Win 10 Pro picture

Dell Precision T3600 | Xeon E5 | 16GB | GPU | 128GB SSD | Win 10 Pro

$115.00



CISCO MCS 7800 (2x) Intel Xeon @ 2.33 GHz 4GB Ram, NO HDD picture

CISCO MCS 7800 (2x) Intel Xeon @ 2.33 GHz 4GB Ram, NO HDD

$44.99



Dell PowerEdge R630 8SFF 2.6Ghz 20-Core 128GB Mem 2x10G+2x1G NIC 2x750W PSU picture

Dell PowerEdge R630 8SFF 2.6Ghz 20-Core 128GB Mem 2x10G+2x1G NIC 2x750W PSU

$399.04



Intel Xeon Gold 6126 2.6 GHz LGA 3647 Server CPU Processor SR3B3 picture

Intel Xeon Gold 6126 2.6 GHz LGA 3647 Server CPU Processor SR3B3

$17.99



Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7 picture

Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7

$17.99



Intel Xeon Gold 6140 SR3AX 2.3GHz 18-Core Processor CPU picture

Intel Xeon Gold 6140 SR3AX 2.3GHz 18-Core Processor CPU

$44.99



Intel Xeon Gold 6138 2.0GHz 27.5MB 20-Core 125W LGA3647 SR3B5 picture

Intel Xeon Gold 6138 2.0GHz 27.5MB 20-Core 125W LGA3647 SR3B5

$46.00



HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA picture

HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA

$234.98



Dell Precision T5600/t5610 Xeon E5-2670 2.6Ghz 16GB DDR3 RAM NO HDD Nvidia picture

Dell Precision T5600/t5610 Xeon E5-2670 2.6Ghz 16GB DDR3 RAM NO HDD Nvidia

$90.00



Discussions

No Discussions have been posted on this vulnerability.