Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Adobe Reader '/Registry' and '/Ordering' Buffer Overflow Vulnerability (Windows)
Information
Severity
Severity
High
Family
Family
Buffer overflow
CVSSv2 Base
CVSSv2 Base
7.6
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:H/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
9 years ago
Modified
Modified
5 years ago
Summary
This host is installed with Adobe Reader and is prone to buffer overflow vulnerability.
Insight
Insight
The flaw is due to the program fails to validate the '/Registry' and '/Ordering' strings
Affected Software
Affected Software
Adobe Reader version 4.0.5 and before on Windows.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Apply the patch from the referenced vendor link.