9.3
CVSSv2

CVE-2007-5659

Published: 12/02/2008 Updated: 29/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and previous versions allow remote malicious users to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

adobe acrobat

adobe acrobat reader

Exploits

## # $Id: adobe_collectemailinforb 10477 2010-09-25 11:59:02Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' re ...
source: wwwsecurityfocuscom/bid/27641/info Adobe Acrobat and Reader are prone to multiple arbitrary remote code-execution and security vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected application Other attacks are also possible Versions prior to Adobe Acrobat ...

Recent Articles

Japan Quake Spam leads to Malware Part 3
Securelist • Nicolas Brulez • 21 Mar 2011

Last week, we published a blog post regarding the ongoing spam campaign using the recent earthquake in Japan to infect users. This is a follow up blog describing the exploits used. According to our analysis, it seems that the malicious links from the spam emails lead to websites hosting the Incognito Exploit Kit. Here is an interesting picture from the servers hosting the exploit kit: You can see below another example from the spam campaign, this time pretending to be an email from Twitter: The ...

Monthly Malware Statistics: February 2010
Securelist • Eugene Aseev • 08 Mar 2010

The first Top Twenty lists malicious programs, adware and potentially unwanted programs that were detected and neutralized when accessed for the first time, i.e. by the on-access scanner. There was no change to the top 5 malicious programs this month and judging by the number of infections, the Kido epidemic has eased off slightly. Exploit.JS.Aurora.a, which, as its name suggests, is a program designed to take advantage of vulnerabilities in a variety of software products. This exploit was widel...