Vulnerabilities > CVE-2007-1199 - Information Disclosure vulnerability in Adobe Acrobat/Adobe Reader

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
network
adobe
nessus
exploit available

Summary

Adobe Reader and Acrobat Trial allow remote attackers to read arbitrary files via a file:// URI in a PDF document, as demonstrated with <</URI(file:///C:/)/S/URI>>, a different issue than CVE-2007-0045.

Exploit-Db

descriptionAdobe Acrobat/Adobe Reader 7.0.9 Information Disclosure Vulnerability. CVE-2007-1199. Remote exploit for windows platform
idEDB-ID:29686
last seen2016-02-03
modified2007-02-28
published2007-02-28
reporterpdp
sourcehttps://www.exploit-db.com/download/29686/
titleAdobe Acrobat/Adobe Reader <= 7.0.9 - Information Disclosure Vulnerability

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200803-01.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200803-01 (Adobe Acrobat Reader: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Adobe Acrobat Reader, including: A file disclosure when using file:// in PDF documents (CVE-2007-1199) Multiple buffer overflows in unspecified JavaScript methods (CVE-2007-5659) An unspecified vulnerability in the Escript.api plugin (CVE-2007-5663) An untrusted search path (CVE-2007-5666) Incorrect handling of printers (CVE-2008-0667) An integer overflow when passing incorrect arguments to
last seen2020-06-01
modified2020-06-02
plugin id31328
published2008-03-04
reporterThis script is Copyright (C) 2008-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/31328
titleGLSA-200803-01 : Adobe Acrobat Reader: Multiple vulnerabilities

Statements

contributorMark J Cox
lastmodified2008-03-06
organizationRed Hat
statementRed Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-1199 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.