Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2006-6027Uncontrolled Resource Consumption in Adobe Acrobat Reader

Severity
9.3CRITICALNVD
NVD5.0
EPSS
64.8%
top 1.53%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedNov 21
Latest updateMay 1

Description

Adobe Reader (Adobe Acrobat Reader) 7.0 through 7.0.8 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument string to the LoadFile method in an AcroPDF ActiveX control.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages3 packages

NVDadobe/acrobat_reader10 versions+9
NVDmozilla/firefox2.0.0.3

🔴Vulnerability Details

4
GHSA
GHSA-jcvx-wgg4-cc84: AcroPDF2022-05-01
GHSA
GHSA-fgmp-qcpg-37v3: Adobe Reader (Adobe Acrobat Reader) 72022-05-01
GHSA
GHSA-3h8p-v7v7-3333: Adobe Reader (Adobe Acrobat Reader) 72022-05-01
VulnCheck
Adobe Acrobat Reader AcroPDF ActiveX Vulnerability2006

💥Exploits & PoCs

1
Exploit-DB
Adobe Reader 7.0.x - Multiple Vulnerabilities2006-11-17

📋Vendor Advisories

2
Red Hat
CVE-2006-6236: Adobe Reader (Adobe Acrobat Reader) 7
Red Hat
CVE-2006-6027: Adobe Reader (Adobe Acrobat Reader) 7
CVE-2006-6027 — Uncontrolled Resource Consumption | cvebase