Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Adobe Reader '/Registry' and '/Ordering' Buffer Overflow Vulnerability (Windows)

Information

Severity

Severity

High

Family

Family

Buffer overflow

CVSSv2 Base

CVSSv2 Base

7.6

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:H/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

8 years ago

Modified

Modified

3 years ago

Summary

This host is installed with Adobe Reader and is prone to buffer overflow vulnerability.

Insight

Insight

The flaw is due to the program fails to validate the '/Registry' and '/Ordering' strings

Affected Software

Affected Software

Adobe Reader version 4.0.5 and before on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Apply the patch from the referenced vendor link.

Common Vulnerabilities and Exposures (CVE)