ID CVE-2007-0048
Summary Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
References
Vulnerable Configurations
  • cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:*:*:elements:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:*:*:elements:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_3d:*:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_3d:*:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:classic:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:-:*:*:*:classic:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:3.01:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:3.02:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0.5a:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.0.5c:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 16-10-2018 - 16:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
accepted 2013-08-12T04:09:26.620-04:00
class vulnerability
contributors
  • name Chandan S
    organization SecPod Technologies
  • name Benjamin Marandel
    organization Marandel.net
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Sergey Artykhov
    organization ALTX-SOFT
  • name Shane Shaffer
    organization G2, Inc.
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Maria Kedovskaya
    organization ALTX-SOFT
  • name Maria Kedovskaya
    organization ALTX-SOFT
definition_extensions
  • comment Adobe Reader 7 Series is installed
    oval oval:org.mitre.oval:def:6377
  • comment Adobe Reader 8 Series is installed
    oval oval:org.mitre.oval:def:6390
  • comment Adobe Reader 9 Series is installed
    oval oval:org.mitre.oval:def:6523
  • comment Adobe Acrobat 7 Series is installed
    oval oval:org.mitre.oval:def:6213
  • comment Adobe Acrobat 8 Series is installed
    oval oval:org.mitre.oval:def:6452
  • comment Adobe Acrobat 9 Series is installed
    oval oval:org.mitre.oval:def:6013
description Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
family windows
id oval:org.mitre.oval:def:6348
status accepted
submitted 2009-10-23T03:25:55
title Adobe Reader and Acrobat DoS via long sequence of # (hash) characters
version 18
refmap via4
bugtraq 20070103 Adobe Acrobat Reader Plugin - Multiple Vulnerabilities
cert TA09-286B
confirm
gentoo GLSA-200701-16
misc
osvdb 31596
sectrack
  • 1017469
  • 1023007
secunia
  • 23812
  • 23882
  • 33754
sreason 2090
suse SUSE-SA:2007:011
vupen
  • ADV-2007-0032
  • ADV-2009-2898
xf adobe-acrobat-character-dos(31273)
Last major update 16-10-2018 - 16:30
Published 03-01-2007 - 21:28
Last modified 16-10-2018 - 16:30
Back to Top