CVE-2007-0048

Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue."
References
Link Resource
http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf
http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html
http://osvdb.org/31596
http://secunia.com/advisories/23812
http://secunia.com/advisories/23882
http://secunia.com/advisories/33754
http://security.gentoo.org/glsa/glsa-200701-16.xml
http://securityreason.com/securityalert/2090
http://securitytracker.com/id?1017469
http://securitytracker.com/id?1023007
http://www.adobe.com/support/security/bulletins/apsb07-01.html
http://www.adobe.com/support/security/bulletins/apsb09-15.html
http://www.securityfocus.com/archive/1/455801/100/0/threaded
http://www.us-cert.gov/cas/techalerts/TA09-286B.html US Government Resource
http://www.vupen.com/english/advisories/2007/0032
http://www.vupen.com/english/advisories/2009/2898
http://www.wisec.it/vulns.php?page=9 Exploit Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/31273
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6348
http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf
http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html
http://osvdb.org/31596
http://secunia.com/advisories/23812
http://secunia.com/advisories/23882
http://secunia.com/advisories/33754
http://security.gentoo.org/glsa/glsa-200701-16.xml
http://securityreason.com/securityalert/2090
http://securitytracker.com/id?1017469
http://securitytracker.com/id?1023007
http://www.adobe.com/support/security/bulletins/apsb07-01.html
http://www.adobe.com/support/security/bulletins/apsb09-15.html
http://www.securityfocus.com/archive/1/455801/100/0/threaded
http://www.us-cert.gov/cas/techalerts/TA09-286B.html US Government Resource
http://www.vupen.com/english/advisories/2007/0032
http://www.vupen.com/english/advisories/2009/2898
http://www.wisec.it/vulns.php?page=9 Exploit Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/31273
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6348
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:adobe:acrobat:*:*:elements:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*
cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_3d:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:24

Type Values Removed Values Added
References () http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf - () http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf -
References () http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html - () http://googlechromereleases.blogspot.com/2009/01/stable-beta-update-yahoo-mail-and.html -
References () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html - () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html -
References () http://osvdb.org/31596 - () http://osvdb.org/31596 -
References () http://secunia.com/advisories/23812 - () http://secunia.com/advisories/23812 -
References () http://secunia.com/advisories/23882 - () http://secunia.com/advisories/23882 -
References () http://secunia.com/advisories/33754 - () http://secunia.com/advisories/33754 -
References () http://security.gentoo.org/glsa/glsa-200701-16.xml - () http://security.gentoo.org/glsa/glsa-200701-16.xml -
References () http://securityreason.com/securityalert/2090 - () http://securityreason.com/securityalert/2090 -
References () http://securitytracker.com/id?1017469 - () http://securitytracker.com/id?1017469 -
References () http://securitytracker.com/id?1023007 - () http://securitytracker.com/id?1023007 -
References () http://www.adobe.com/support/security/bulletins/apsb07-01.html - () http://www.adobe.com/support/security/bulletins/apsb07-01.html -
References () http://www.adobe.com/support/security/bulletins/apsb09-15.html - () http://www.adobe.com/support/security/bulletins/apsb09-15.html -
References () http://www.securityfocus.com/archive/1/455801/100/0/threaded - () http://www.securityfocus.com/archive/1/455801/100/0/threaded -
References () http://www.us-cert.gov/cas/techalerts/TA09-286B.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-286B.html - US Government Resource
References () http://www.vupen.com/english/advisories/2007/0032 - () http://www.vupen.com/english/advisories/2007/0032 -
References () http://www.vupen.com/english/advisories/2009/2898 - () http://www.vupen.com/english/advisories/2009/2898 -
References () http://www.wisec.it/vulns.php?page=9 - Exploit, Patch, Vendor Advisory () http://www.wisec.it/vulns.php?page=9 - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/31273 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/31273 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6348 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6348 -

Information

Published : 2007-01-03 21:28

Updated : 2024-11-21 00:24


NVD link : CVE-2007-0048

Mitre link : CVE-2007-0048

CVE.ORG link : CVE-2007-0048


JSON object : View

Products Affected

adobe

  • acrobat_reader
  • acrobat
  • acrobat_3d