10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.966 High
EPSS
Percentile
99.6%
The version of Adobe Reader installed on the remote Windows host is a version prior or equal to 2015.006.30417, 2017.011.30079, or 2018.011.20038. It is, therefore, affected by multiple vulnerabilities.
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#
# (C) Tenable Network Security, Inc.
#
include('compat.inc');
if (description)
{
script_id(109896);
script_version("1.11");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/06/08");
script_cve_id(
"CVE-2018-4947",
"CVE-2018-4948",
"CVE-2018-4949",
"CVE-2018-4950",
"CVE-2018-4951",
"CVE-2018-4952",
"CVE-2018-4953",
"CVE-2018-4954",
"CVE-2018-4955",
"CVE-2018-4956",
"CVE-2018-4957",
"CVE-2018-4958",
"CVE-2018-4959",
"CVE-2018-4960",
"CVE-2018-4961",
"CVE-2018-4962",
"CVE-2018-4963",
"CVE-2018-4964",
"CVE-2018-4965",
"CVE-2018-4966",
"CVE-2018-4967",
"CVE-2018-4968",
"CVE-2018-4969",
"CVE-2018-4970",
"CVE-2018-4971",
"CVE-2018-4972",
"CVE-2018-4973",
"CVE-2018-4974",
"CVE-2018-4975",
"CVE-2018-4976",
"CVE-2018-4977",
"CVE-2018-4978",
"CVE-2018-4979",
"CVE-2018-4980",
"CVE-2018-4981",
"CVE-2018-4982",
"CVE-2018-4983",
"CVE-2018-4984",
"CVE-2018-4985",
"CVE-2018-4986",
"CVE-2018-4987",
"CVE-2018-4988",
"CVE-2018-4989",
"CVE-2018-4990",
"CVE-2018-4993",
"CVE-2018-4995",
"CVE-2018-4996",
"CVE-2018-12812",
"CVE-2018-12815"
);
script_bugtraq_id(
104102,
104167,
104168,
104169,
104171,
104172,
104173,
104174,
104175,
104176,
104177
);
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/06/22");
script_name(english:"Adobe Reader <= 2015.006.30417 / 2017.011.30079 / 2018.011.20038 Multiple Vulnerabilities (APSB18-09)");
script_set_attribute(attribute:"synopsis", value:
"The version of Adobe Reader installed on the remote Windows host is
affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Adobe Reader installed on the remote Windows host is a
version prior or equal to 2015.006.30417, 2017.011.30079, or
2018.011.20038. It is, therefore, affected by multiple
vulnerabilities.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
script_set_attribute(attribute:"see_also", value:"https://helpx.adobe.com/security/products/acrobat/apsb18-09.html");
script_set_attribute(attribute:"solution", value:
"Upgrade to Adobe Reader 2015.006.30418 / 2017.011.30080
/ 2018.011.20040 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-4996");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/14");
script_set_attribute(attribute:"patch_publication_date", value:"2018/05/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/05/17");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:adobe:acrobat_reader");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows");
script_copyright(english:"This script is Copyright (C) 2018-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("adobe_reader_installed.nasl");
script_require_keys("SMB/Registry/Enumerated", "installed_sw/Adobe Reader");
exit(0);
}
include("vcf.inc");
include("vcf_extras.inc");
get_kb_item_or_exit("SMB/Registry/Enumerated");
app_info = vcf::adobe_reader::get_app_info();
constraints = [
{ "min_version" : "15.6", "max_version" : "15.6.30417", "fixed_version" : "15.6.30418" },
{ "min_version" : "17.8", "max_version" : "17.11.30079", "fixed_version" : "17.11.30080" },
{ "min_version" : "15.7", "max_version" : "18.11.20038", "fixed_version" : "18.11.20040" }
];
# using adobe_reader namespace check_version_and_report to properly detect Continuous vs Classic,
# and limit ver segments to 3 (18.x.y vs 18.x.y.12345) with max_segs:3
vcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);
Vendor | Product | Version | CPE |
---|---|---|---|
adobe | acrobat_reader | cpe:/a:adobe:acrobat_reader |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12812
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12815
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4947
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4948
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4949
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4950
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4951
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4952
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4953
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4954
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4955
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4956
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4957
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4958
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4959
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4960
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4961
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4962
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4963
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4964
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4965
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4966
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4967
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4968
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4970
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4971
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4972
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4979
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4980
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4981
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4982
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4983
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4984
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4985
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4986
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4987
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4989
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4993
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4996
helpx.adobe.com/security/products/acrobat/apsb18-09.html
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.966 High
EPSS
Percentile
99.6%