CERTA-2008-AVI-166
Vulnerability from certfr_avis

Une vulnérabilité dans Acrobat Reader permet à un utilisateur malveillant local d'élever ses privilèges.

Description

Sur des machines Unix ou Linux, le logiciel Acrobat Reader créée un fichier temporaire sans protection suffisante lors du traitement de certificats SSL. Cette vulnérabilité permet à un utilisateur malveillant local d'élever ses privilèges.

Solution

L'éditeur Adobe n'a pas émis de correctifs. Cependant des éditeurs de distributions Unix/Linux ont émis des correctifs. Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Acrobat Reader 8.1.x sur machine Unix ou Linux.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cSPAN class=\"textit\"\u003eAcrobat  Reader\u003c/SPAN\u003e 8.1.x sur machine \u003cSPAN class=\"textit\"\u003eUnix\u003c/SPAN\u003e  ou \u003cSPAN class=\"textit\"\u003eLinux\u003c/SPAN\u003e.",
  "content": "## Description\n\nSur des machines Unix ou Linux, le logiciel Acrobat Reader cr\u00e9\u00e9e un\nfichier temporaire sans protection suffisante lors du traitement de\ncertificats SSL. Cette vuln\u00e9rabilit\u00e9 permet \u00e0 un utilisateur malveillant\nlocal d\u0027\u00e9lever ses privil\u00e8ges.\n\n## Solution\n\nL\u0027\u00e9diteur Adobe n\u0027a pas \u00e9mis de correctifs. Cependant des \u00e9diteurs de\ndistributions Unix/Linux ont \u00e9mis des correctifs. Se r\u00e9f\u00e9rer au bulletin\nde s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section\nDocumentation).\n",
  "cves": [
    {
      "name": "CVE-2008-0883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0883"
    }
  ],
  "initial_release_date": "2008-03-28T00:00:00",
  "last_revision_date": "2008-03-28T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSA08-02 du 11 mars 2008 :",
      "url": "http://www.adobe.com/support/security/bulletins/apsa08-02.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200803-26 du 18 mars 2008    :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200803-26.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Novell Suse SUSE-SR:2008:005 du 06    mars 2008 :",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-3/msg0001.html"
    }
  ],
  "reference": "CERTA-2008-AVI-166",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2008-03-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans \u003cspan class=\"textit\"\u003eAcrobat Reader\u003c/span\u003e permet\n\u00e0 un utilisateur malveillant local d\u0027\u00e9lever ses privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Acrobat Reader",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "CVE-2008-0883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0883"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…