ID CVE-2007-0047
Summary CRLF injection vulnerability in Adobe Acrobat Reader Plugin before 8.0.0, when used with the Microsoft.XMLHTTP ActiveX object in Internet Explorer, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the javascript: URI in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
References
Vulnerable Configurations
  • cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:classic:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:classic:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
CVSS
Base: 6.8 (as of 29-07-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:P/I:P/A:P
refmap via4
misc http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf
sectrack 1017469
secunia 23882
suse SUSE-SA:2007:011
vupen ADV-2007-0032
xf adobe-acrobat-xmlhttp-response-splitting(31291)
Last major update 29-07-2017 - 01:29
Published 03-01-2007 - 21:28
Last modified 29-07-2017 - 01:29
Back to Top