ID

VAR-201510-0402


CVE

CVE-2015-7829


TITLE

Windows Run on Adobe Reader and Acrobat Vulnerable to arbitrary file deletion

Trust: 0.8

sources: JVNDB: JVNDB-2015-005287

DESCRIPTION

Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows mishandle junctions in the Synchronizer directory, which allows attackers to delete arbitrary files via Adobe Collaboration Sync, a related issue to CVE-2015-2428. This vulnerability CVE-2015-3095 , CVE-2015-5087 , CVE-2015-5094 , CVE-2015-5100 , CVE-2015-5102 , CVE-2015-5103 ,and CVE-2015-5104 Is a different vulnerability.By the attacker, Adobe Collaboration Sync Any file may be deleted through. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of junction points. An attacker running code in the context of a sandboxed Adobe Reader process can set up a junction point in the Synchronizer folder and then run Adobe Collaboration Sync which will delete the contents of the folder. This may lead to further attacks. Adobe Reader, etc. are all products of Adobe (Adobe) in the United States. Adobe Reader is a free PDF file reader; Acrobat is a PDF file editing and conversion tool; Acrobat Reader DC is a set of tools for viewing, printing and annotating PDF

Trust: 2.61

sources: NVD: CVE-2015-7829 // JVNDB: JVNDB-2015-005287 // ZDI: ZDI-15-465 // BID: 77090 // VULHUB: VHN-85790

AFFECTED PRODUCTS

vendor:adobemodel:acrobat dcscope:gteversion:15.006.30060

Trust: 1.0

vendor:adobemodel:acrobat dcscope:gteversion:15.008.20082

Trust: 1.0

vendor:adobemodel:acrobatscope:lteversion:10.1.15

Trust: 1.0

vendor:adobemodel:acrobatscope:gteversion:10.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:10.1.15

Trust: 1.0

vendor:adobemodel:acrobat readerscope:gteversion:10.0

Trust: 1.0

vendor:adobemodel:acrobat dcscope:ltversion:15.006.30094

Trust: 1.0

vendor:adobemodel:acrobat reader dcscope:ltversion:15.009.20069

Trust: 1.0

vendor:adobemodel:acrobat reader dcscope:gteversion:15.006.30060

Trust: 1.0

vendor:adobemodel:acrobat dcscope:ltversion:15.009.20069

Trust: 1.0

vendor:adobemodel:acrobat reader dcscope:gteversion:15.008.20082

Trust: 1.0

vendor:adobemodel:acrobatscope:lteversion:11.0.12

Trust: 1.0

vendor:adobemodel:acrobat readerscope:lteversion:11.0.12

Trust: 1.0

vendor:adobemodel:acrobat reader dcscope:ltversion:15.006.30094

Trust: 1.0

vendor:adobemodel:acrobatscope:gteversion:11.0.0

Trust: 1.0

vendor:adobemodel:acrobat readerscope:gteversion:11.0.0

Trust: 1.0

vendor:adobemodel:acrobatscope:ltversion:11.x (windows)

Trust: 0.8

vendor:adobemodel:acrobat dcscope:ltversion:(windows)

Trust: 0.8

vendor:adobemodel:acrobat reader dcscope:ltversion:(windows)

Trust: 0.8

vendor:adobemodel:acrobat reader dcscope:eqversion:classic 2015.006.30094

Trust: 0.8

vendor:adobemodel:acrobatscope:eqversion:xi desktop 11.0.13

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:10.x (windows)

Trust: 0.8

vendor:adobemodel:readerscope:ltversion:11.x (windows)

Trust: 0.8

vendor:adobemodel:acrobat dcscope:eqversion:continuous 2015.009.20069

Trust: 0.8

vendor:adobemodel:readerscope:eqversion:xi desktop 11.0.13

Trust: 0.8

vendor:adobemodel:acrobatscope:eqversion:x desktop 10.1.16

Trust: 0.8

vendor:adobemodel:acrobat dcscope:eqversion:classic 2015.006.30094

Trust: 0.8

vendor:adobemodel:acrobat reader dcscope:eqversion:continuous 2015.009.20069

Trust: 0.8

vendor:adobemodel:readerscope:eqversion:x desktop 10.1.16

Trust: 0.8

vendor:adobemodel:acrobatscope:ltversion:10.x (windows)

Trust: 0.8

vendor:adobemodel:readerscope: - version: -

Trust: 0.7

vendor:adobemodel:acrobatscope:eqversion:11.0.3

Trust: 0.6

vendor:adobemodel:acrobat readerscope:eqversion:10.1.12

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:11.0.6

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:11.0.2

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:11.0.5

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:11.0.1

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:10.1.0

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:11.0.4

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:10.1.1

Trust: 0.6

vendor:adobemodel:acrobatscope:eqversion:11.0.0

Trust: 0.6

vendor:adobemodel:readerscope:eqversion:11.0.12

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.11

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.7

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.6

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.15

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.14

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.12

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.10

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.9

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.4

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:5.0.10

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.10

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.09

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.08

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0.05

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:11.0

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.13

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1.11

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0.3

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0.2

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0.1

Trust: 0.3

vendor:adobemodel:readerscope:eqversion:10.0

Trust: 0.3

vendor:adobemodel:readerscope:neversion:11.0.13

Trust: 0.3

vendor:adobemodel:readerscope:neversion:10.1.16

Trust: 0.3

sources: ZDI: ZDI-15-465 // BID: 77090 // JVNDB: JVNDB-2015-005287 // CNNVD: CNNVD-201510-262 // NVD: CVE-2015-7829

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7829
value: LOW

Trust: 1.0

NVD: CVE-2015-7829
value: LOW

Trust: 0.8

ZDI: CVE-2015-7829
value: LOW

Trust: 0.7

CNNVD: CNNVD-201510-262
value: LOW

Trust: 0.6

VULHUB: VHN-85790
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2015-7829
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2015-7829
severity: LOW
baseScore: 3.3
vectorString: AV:L/AC:M/AU:N/C:N/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

ZDI: CVE-2015-7829
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:N/I:N/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-85790
severity: LOW
baseScore: 1.9
vectorString: AV:L/AC:M/AU:N/C:N/I:P/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-15-465 // VULHUB: VHN-85790 // JVNDB: JVNDB-2015-005287 // CNNVD: CNNVD-201510-262 // NVD: CVE-2015-7829

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.1

problemtype:CWE-264

Trust: 0.9

sources: VULHUB: VHN-85790 // JVNDB: JVNDB-2015-005287 // NVD: CVE-2015-7829

THREAT TYPE

local

Trust: 0.9

sources: BID: 77090 // CNNVD: CNNVD-201510-262

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201510-262

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-005287

PATCH

title:APSB15-24url:https://helpx.adobe.com/security/products/acrobat/apsb15-24.html

Trust: 1.5

title:APSB15-24url:https://helpx.adobe.com/jp/security/products/reader/apsb15-24.html

Trust: 0.8

title:アドビ システムズ社 Adobe Reader の脆弱性に関するお知らせurl:http://www.fmworld.net/biz/common/adobe/20151015.html

Trust: 0.8

title:Multiple Adobe Product security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58111

Trust: 0.6

sources: ZDI: ZDI-15-465 // JVNDB: JVNDB-2015-005287 // CNNVD: CNNVD-201510-262

EXTERNAL IDS

db:NVDid:CVE-2015-7829

Trust: 3.2

db:ZDIid:ZDI-15-465

Trust: 2.7

db:SECTRACKid:1033796

Trust: 1.7

db:JVNDBid:JVNDB-2015-005287

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2892

Trust: 0.7

db:CNNVDid:CNNVD-201510-262

Trust: 0.6

db:BIDid:77090

Trust: 0.3

db:VULHUBid:VHN-85790

Trust: 0.1

sources: ZDI: ZDI-15-465 // VULHUB: VHN-85790 // BID: 77090 // JVNDB: JVNDB-2015-005287 // CNNVD: CNNVD-201510-262 // NVD: CVE-2015-7829

REFERENCES

url:https://helpx.adobe.com/security/products/acrobat/apsb15-24.html

Trust: 2.7

url:http://www.zerodayinitiative.com/advisories/zdi-15-465

Trust: 1.7

url:http://www.securitytracker.com/id/1033796

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7829

Trust: 0.8

url:http://www.ipa.go.jp/security/ciadr/vul/20151014-adobereader.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2015/at150035.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7829

Trust: 0.8

url:http://www.npa.go.jp/cyberpolice/topics/?seq=17022

Trust: 0.8

url:http://www.adobe.com

Trust: 0.3

url:http://get.adobe.com/reader/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-465/

Trust: 0.3

sources: ZDI: ZDI-15-465 // VULHUB: VHN-85790 // BID: 77090 // JVNDB: JVNDB-2015-005287 // CNNVD: CNNVD-201510-262 // NVD: CVE-2015-7829

CREDITS

AbdulAziz Hariri and Jasiel Spelman of HP Zero Day Initiative

Trust: 1.0

sources: ZDI: ZDI-15-465 // BID: 77090

SOURCES

db:ZDIid:ZDI-15-465
db:VULHUBid:VHN-85790
db:BIDid:77090
db:JVNDBid:JVNDB-2015-005287
db:CNNVDid:CNNVD-201510-262
db:NVDid:CVE-2015-7829

LAST UPDATE DATE

2024-11-23T21:43:45.623000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-465date:2015-10-13T00:00:00
db:VULHUBid:VHN-85790date:2020-05-19T00:00:00
db:BIDid:77090date:2015-10-13T00:00:00
db:JVNDBid:JVNDB-2015-005287date:2015-10-16T00:00:00
db:CNNVDid:CNNVD-201510-262date:2020-05-20T00:00:00
db:NVDid:CVE-2015-7829date:2024-11-21T02:37:29.060

SOURCES RELEASE DATE

db:ZDIid:ZDI-15-465date:2015-10-13T00:00:00
db:VULHUBid:VHN-85790date:2015-10-15T00:00:00
db:BIDid:77090date:2015-10-13T00:00:00
db:JVNDBid:JVNDB-2015-005287date:2015-10-16T00:00:00
db:CNNVDid:CNNVD-201510-262date:2015-10-15T00:00:00
db:NVDid:CVE-2015-7829date:2015-10-15T00:00:13.720