语言:
http://www.adobe.com/support/security/advisories/apsa11-04.html
http://www.adobe.com/support/security/bulletins/apsb11-28.html
http://www.adobe.com/support/security/bulletins/apsb11-30.html
http://www.adobe.com/support/security/bulletins/apsb12-01.html
严重性: Critical
ID: 57044
文件名: macosx_adobe_reader_apsa11-04.nasl
版本: 1.19
类型: local
代理: macosx
发布时间: 2011/12/7
最近更新时间: 2022/6/8
支持的传感器: Nessus Agent, Nessus
风险因素: Critical
分数: 9.6
风险因素: Critical
基本分数: 10
时间分数: 8.7
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2011-4369
风险因素: Critical
基本分数: 9.8
时间分数: 9.4
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:H/RL:O/RC:C
CVSS 分数来源: CVE-2011-4373
CPE: cpe:/a:adobe:acrobat_reader
必需的 KB 项: Host/local_checks_enabled, Host/MacOSX/Version, installed_sw/Adobe Reader
可利用: true
易利用性: Exploits are available
补丁发布日期: 2011/12/6
漏洞发布日期: 2011/12/6
CISA 已知可遭利用的漏洞到期日期: 2022/6/22
CANVAS (CANVAS)
Core Impact
Metasploit (Adobe Reader U3D Memory Corruption Vulnerability)
CVE: CVE-2011-2445, CVE-2011-2450, CVE-2011-2451, CVE-2011-2452, CVE-2011-2453, CVE-2011-2454, CVE-2011-2455, CVE-2011-2456, CVE-2011-2457, CVE-2011-2458, CVE-2011-2459, CVE-2011-2460, CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373
BID: 50618, 50619, 50620, 50621, 50622, 50623, 50624, 50625, 50626, 50627, 50628, 50629, 50922, 51092, 51348, 51349, 51350, 51351