CERTA-2008-AVI-166

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité dans Acrobat Reader permet à un utilisateur malveillant local d'élever ses privilèges.

Description

Sur des machines Unix ou Linux, le logiciel Acrobat Reader créée un fichier temporaire sans protection suffisante lors du traitement de certificats SSL. Cette vulnérabilité permet à un utilisateur malveillant local d'élever ses privilèges.

Solution

L'éditeur Adobe n'a pas émis de correctifs. Cependant des éditeurs de distributions Unix/Linux ont émis des correctifs. Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Acrobat Reader 8.1.x sur machine Unix ou Linux.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cSPAN class=\"textit\"\u003eAcrobat  Reader\u003c/SPAN\u003e 8.1.x sur machine \u003cSPAN class=\"textit\"\u003eUnix\u003c/SPAN\u003e  ou \u003cSPAN class=\"textit\"\u003eLinux\u003c/SPAN\u003e.",
  "content": "## Description\n\nSur des machines Unix ou Linux, le logiciel Acrobat Reader cr\u00e9\u00e9e un\nfichier temporaire sans protection suffisante lors du traitement de\ncertificats SSL. Cette vuln\u00e9rabilit\u00e9 permet \u00e0 un utilisateur malveillant\nlocal d\u0027\u00e9lever ses privil\u00e8ges.\n\n## Solution\n\nL\u0027\u00e9diteur Adobe n\u0027a pas \u00e9mis de correctifs. Cependant des \u00e9diteurs de\ndistributions Unix/Linux ont \u00e9mis des correctifs. Se r\u00e9f\u00e9rer au bulletin\nde s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section\nDocumentation).\n",
  "cves": [
    {
      "name": "CVE-2008-0883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0883"
    }
  ],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSA08-02 du 11 mars 2008 :",
      "url": "http://www.adobe.com/support/security/bulletins/apsa08-02.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200803-26 du 18 mars 2008    :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-26.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Novell Suse SUSE-SR:2008:005 du 06    mars 2008 :",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-3/msg0001.html"
    }
  ],
  "reference": "CERTA-2008-AVI-166",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-03-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans \u003cspan class=\"textit\"\u003eAcrobat Reader\u003c/span\u003e permet\n\u00e0 un utilisateur malveillant local d\u0027\u00e9lever ses privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Acrobat Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "CVE-2008-0883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0883"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…