Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-674: acroread

Vulnerability Assessment Details

RHSA-2004-674: acroread

Vulnerability Assessment Summary
Check for the version of the acroread packages

Detailed Explanation for this Vulnerability Assessment

An updated Adobe Acrobat Reader package that fixes a security issue is now

The Adobe Acrobat Reader browser permits for the viewing, distributing, and
printing of documents in portable document format (PDF).

iDEFENSE has reported that Adobe Acrobat Reader 5.0.9 contains a buffer
overflow when decoding email messages. A possible hacker could create a
malicious PDF file which could execute arbitrary code if opened by a
victim. The Common Vulnerabilities and Exposures project has assigned the
name CVE-2004-1152 to this issue.

All users of Acrobat Reader are advised to upgrade to this updated package,
which contains Acrobat Reader version 5.0.10 which is not vulnerable to
this issue.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Lenovo ThinkPad X131e 11.6in. (320GB, AMD E-Series, 1.3GHz, 2GB) Notebook/Lapto…
Lenovo ThinkPad X131e 11.6in. (320GB, AMD E-Series, 1.3GHz, 2GB) Notebook/Lapto… pictureLenovo 15.6-inch Laptop Urban Backpack B530
Lenovo 15.6-inch Laptop Urban Backpack B530 pictureLenovo Yoga 2 11.6" TouchScreen 2-in-1 Laptop PC - Pentium N3520 / 4GB / 500GB 
Lenovo Yoga 2 11.6Lenovo Flex 4-1130 80U3 11.6" LCD Hinge Cover/Bezel
Lenovo Flex 4-1130 80U3 11.6


No Discussions have been posted on this vulnerability.