Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2010.0583 Security updates available for Adobe Reader and Acrobat 30 June 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Adobe Reader 9.3.2 and prior Adobe Acrobat 9.3.2 and prior Adobe Reader 8.2.2 and prior Adobe Acrobat 8.2.2 and prior Publisher: Adobe Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Denial of Service -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2010-2212 CVE-2010-2211 CVE-2010-2210 CVE-2010-2209 CVE-2010-2208 CVE-2010-2207 CVE-2010-2206 CVE-2010-2205 CVE-2010-2204 CVE-2010-2203 CVE-2010-2202 CVE-2010-2201 CVE-2010-2168 CVE-2010-1297 CVE-2010-1295 CVE-2010-1285 CVE-2010-1240 Reference: ASB-2010.0139 ESB-2010.0524 Original Bulletin: http://www.adobe.com/support/security/bulletins/apsb10-15.html - --------------------------BEGIN INCLUDED TEXT-------------------- Security updates available for Adobe Reader and Acrobat Release date: June 29, 2010 Vulnerability identifier: APSB10-15 CVE numbers: CVE-2010-1240, CVE-2010-1285, CVE-2010-1295, CVE-2010-1297, CVE-2010-2168, CVE-2010-2201, CVE-2010-2202, CVE-2010-2203, CVE-2010-2204, CVE-2010-2205, CVE-2010-2206, CVE-2010-2207, CVE-2010-2208, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211, CVE-2010-2212 Platform: All Platforms Summary Critical vulnerabilities have been identified in Adobe Reader 9.3.2 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.2 (and earlier versions) for Windows and Macintosh, and Adobe Reader 8.2.2 (and earlier versions) and Adobe Acrobat 8.2.2 (and earlier versions) for Windows and Macintosh. These vulnerabilities, including CVE-2010-1297 referenced in Security Advisory APSA10-01, could cause the application to crash and could potentially allow an attacker to take control of the affected system. Adobe recommends users of Adobe Reader 9.3.2 and earlier versions for Windows, Macintosh and UNIX update to Adobe Reader 9.3.3. (For Adobe Reader users on Windows and Macintosh, who cannot update to Adobe Reader 9.3.3, Adobe has provided the Adobe Reader 8.2.3 update.) Adobe recommends users of Adobe Acrobat 9.3.2 and earlier versions for Windows and Macintosh update to Adobe Acrobat 9.3.3. Adobe recommends users of Adobe Acrobat 8.2.2 and earlier versions for Windows and Macintosh update to Adobe Acrobat 8.2.3. Affected software versions Adobe Reader 9.3.2 and earlier versions for Windows, Macintosh, and UNIX Adobe Acrobat 9.3.2 and earlier versions for Windows and Macintosh Solution Adobe Reader Users can utilize the product's automatic update feature. The default installation configuration runs automatic updates on a regular schedule and can be manually activated by choosing Help > Check for Updates. Adobe Reader users on Windows can also find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows. Adobe Reader users on Macintosh can also find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Macintosh. Adobe Reader users on UNIX can find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Unix. Adobe Acrobat Users can utilize the product's automatic update feature. The default installation configuration runs automatic updates on a regular schedule and can be manually activated by choosing Help > Check for Updates. Acrobat Standard and Pro users on Windows can also find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows. Acrobat Pro Extended users on Windows can also find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=158&platform=Windows. Acrobat 3D users on Windows can also find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=112&platform=Windows. Acrobat Pro users on Macintosh can also find the appropriate update here: http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh. Severity rating Adobe categorizes these as critical updates and recommends that users apply the latest updates for their product installations. Summary Critical vulnerabilities have been identified in Adobe Reader 9.3.2 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.2 (and earlier versions) for Windows and Macintosh, and Adobe Reader 8.2.2 (and earlier versions) and Adobe Acrobat 8.2.2 (and earlier versions) for Windows and Macintosh. These vulnerabilities, including CVE-2010-1297 referenced in Security Advisory APSA10-01, could cause the application to crash and could potentially allow an attacker to take control of the affected system. Adobe recommends users of Adobe Reader 9.3.2 and earlier versions for Windows, Macintosh and UNIX update to Adobe Reader 9.3.3. (For Adobe Reader users on Windows and Macintosh, who cannot update to Adobe Reader 9.3.3, Adobe has provided the Adobe Reader 8.2.3 update.) Adobe recommends users of Adobe Acrobat 9.3.2 and earlier versions for Windows and Macintosh update to Adobe Acrobat 9.3.3. Adobe recommends users of Adobe Acrobat 8.2.2 and earlier versions for Windows and Macintosh update to Adobe Acrobat 8.2.3. This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-1297). Note: There are reports that this issue is being actively exploited in the wild. This update mitigates a social engineering attack that could lead to code execution (CVE-2010-1240). This update resolves an invalid pointer vulnerability that could lead to code execution (CVE-2010-1285). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-1295). This update resolves an invalid pointer vulnerability that could lead to code execution (CVE-2010-2168). This update resolves an invalid pointer vulnerability that could lead to code execution (CVE-2010-2201). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-2202). This update resolves a UNIX-only memory corruption vulnerability that could lead to code execution (CVE-2010-2203). This update resolves a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible (CVE-2010-2204). This update resolves an uninitialized memory vulnerability that could lead to code execution (CVE-2010-2205). This update resolves an array-indexing error vulnerability that could lead to code execution (CVE-2010-2206). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-2207). This update resolves a dereference deleted heap object vulnerability that could lead to code execution (CVE-2010-2208). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-2209). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-2210). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-2211). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-2212). Acknowledgements Adobe would like to thank the following individuals and organizations for reporting the relevant issues and for working with Adobe to help protect our customers: * Nicolas Joly of VUPEN Vulnerability Research Team (CVE-2010-1285, CVE-2010-2168, CVE-2010-2201, CVE-2010-2212) * Microsoft Vulnerability Research (MSVR) (CVE-2010-1295) * Didier Stevens (CVE-2010-1240) * Philippe Lagadec of NATO C3 Agency (CVE-2010-1240) * An anonymous researcher through TippingPoint's Zero Day Initiative (CVE-2010-2202) * James Quirk of Los Alamos, New Mexico (CVE-2010-2203) * Gjoko Krstic of Zero Science Lab (CVE-2010-2204) * Alin Rad Pop of Secunia Research (CVE-2010-2205) * Carsten Eiram of Secunia Research (CVE-2010-2206) * Tavis Ormandy of the Google Security Team (CVE-2010-2207, CVE-2010-2208, CVE-2010-2209, CVE-2010-2210, CVE-2010-2211) Revisions June 29, 2010 - Updated URL for UNIX release. June 29, 2010 - Bulletin released. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFMKo7w/iFOrG6YcBERArgVAJ4yp32SVQgu/Znt/2wVJXEgerk4VwCfeOXL 2fF2rChen1D3ddMeBwNrMHQ= =YCjf -----END PGP SIGNATURE-----