CVE-2007-0048
Summary
| CVE | CVE-2007-0048 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-01-03 21:28:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Adobe Acrobat Reader Plugin before 8.0.0, and possibly the plugin distributed with Adobe Reader 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2, when used with Internet Explorer, Google Chrome, or Opera, allows remote attackers to cause a denial of service (memory consumption) via a long sequence of # (hash) characters appended to a PDF URL, related to a "cross-site scripting issue." |
Risk And Classification
Primary CVSS: v2.0 5 from [email protected]
AV:N/AC:L/Au:N/C:N/I:N/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
PartialAV:N/AC:L/Au:N/C:N/I:N/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Adobe | Acrobat | 7.0 | All | professional | All |
| Application | Adobe | Acrobat | 7.0 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.1 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.1 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.2 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.2 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.3 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.3 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.4 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.4 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.5 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.5 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.6 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.6 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.7 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.7 | All | standard | All |
| Application | Adobe | Acrobat | 7.0.8 | All | professional | All |
| Application | Adobe | Acrobat | 7.0.8 | All | standard | All |
| Application | Adobe | Acrobat | All | All | elements | All |
| Application | Adobe | Acrobat 3d | All | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.1 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.2 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.3 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.4 | All | All | All |
| Application | Adobe | Acrobat Reader | 6.0.5 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.1 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.2 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.3 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.4 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.5 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.6 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.7 | All | All | All |
| Application | Adobe | Acrobat Reader | 7.0.8 | All | All | All |
| Application | Adobe | Acrobat Reader | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| US-CERT Technical Cyber Security Alert TA09-286B -- Adobe Reader and Acrobat Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.us-cert.gov | US Government Resource |
| Gentoo update for acroread - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| osvdb.org/31596 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| SecurityTracker.com Archives - Adobe Acrobat Reader Plugin Bugs Let Remote Users Deny Service, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| SecurityReason - Adobe Acrobat Reader Plugin - Multiple Vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | securityreason.com | |
| events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf | af854a3a-2127-422b-91ae-364da2661108 | events.ccc.de | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Adobe Acrobat Reader: Multiple vulnerabilities — Gentoo Linux Documentation | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| Adobe - Security Advisories : Update available for vulnerabilities in versions 7.0.8 and earlier of Adobe Reader and Acrobat | af854a3a-2127-422b-91ae-364da2661108 | www.adobe.com | |
| SecurityTracker.com Archives - Adobe Acrobat and Adobe Reader Flaws Lets Remote Users Execute Arbitrary Code and Deny Service | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| SUSE update for acroread - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SuSE Security announcements: [suse-security-announce] SUSE Security Announcement: Acrobat Reader 7.0.9 (SUSE-SA:2007:011) | af854a3a-2127-422b-91ae-364da2661108 | lists.suse.com | |
| Adobe - Security Bulletin APSB09-15 Security Updates Available for Adobe Reader and Acrobat | af854a3a-2127-422b-91ae-364da2661108 | www.adobe.com | |
| Google Chrome Releases: Stable, Beta update: Yahoo! Mail and Security Fixes | af854a3a-2127-422b-91ae-364da2661108 | googlechromereleases.blogspot.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Google Chrome Cross-Site Scripting and Information Disclosure - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Wisec - The WIse SECurity | af854a3a-2127-422b-91ae-364da2661108 | www.wisec.it | Exploit, Patch, Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.