-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2016.0088.2
          Security Updates Available for Adobe Acrobat and Reader
                               29 April 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Adobe Acrobat
                   Adobe Reader
Publisher:         Adobe
Operating System:  Windows
                   Mac OS
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-1111 CVE-2016-0947 CVE-2016-0946
                   CVE-2016-0945 CVE-2016-0944 CVE-2016-0943
                   CVE-2016-0942 CVE-2016-0941 CVE-2016-0940
                   CVE-2016-0939 CVE-2016-0938 CVE-2016-0937
                   CVE-2016-0936 CVE-2016-0935 CVE-2016-0934
                   CVE-2016-0933 CVE-2016-0932 CVE-2016-0931

Original Bulletin: 
   https://helpx.adobe.com/security/products/acrobat/apsb16-02.html

Revision History:  April   29 2016: Added CVE-2016-1111
                   January 13 2016: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Adobe Security Bulletin

Security Updates Available for Adobe Acrobat and Reader

Release date: January 7, 2016

Last updated: January 12, 2016

Vulnerability identifier: APSB16-02

Priority: See table below

CVE numbers: CVE-2016-0931, CVE-2016-0932, CVE-2016-0933, CVE-2016-0934, 
CVE-2016-0935, CVE-2016-0936, CVE-2016-0937, CVE-2016-0938, CVE-2016-0939, 
CVE-2016-0940, CVE-2016-0941, CVE-2016-0942, CVE-2016-0943, CVE-2016-0944, 
CVE-2016-0945, CVE-2016-0946, CVE-2016-0947, CVE-2016-1111

Platform: Windows and Macintosh

Summary

Adobe has released security updates for Adobe Acrobat and Reader for Windows 
and Macintosh. These updates address critical vulnerabilities that could 
potentially allow an attacker to take control of the affected system.

Affected Versions

Product			Track 		Affected Versions 			Platform

Acrobat DC         	Continuous  	15.009.20077 and earlier versions  	Windows and Macintosh
Acrobat Reader DC  	Continuous  	15.009.20077 and earlier versions  	Windows and Macintosh
Acrobat DC         	Classic     	15.006.30097 and earlier versions  	Windows and Macintosh
Acrobat Reader DC  	Classic    	15.006.30097 and earlier versions  	Windows and Macintosh
Acrobat XI        	Desktop    	11.0.13 and earlier versions       	Windows and Macintosh
Reader XI         	Desktop    	11.0.13 and earlier versions       	Windows and Macintosh

Note: As outlined in this blog post, Adobe Acrobat X and Adobe Reader X are no
longer supported. Adobe recommends users install Adobe Acrobat DC and Adobe 
Acrobat Reader DC for the latest features and security updates.

For questions regarding Acrobat DC, please visit the Acrobat DC FAQ page. For
questions regarding Acrobat Reader DC, please visit the Acrobat Reader DC FAQ
page.

Solution

Adobe recommends users update their software installations to the latest 
versions by following the instructions below.

The latest product versions are available to end users via one of the 
following methods:

Users can update their product installations manually by choosing Help > Check
for Updates.

The products will update automatically when updates are detected without 
requiring user intervention.

The full Acrobat Reader installer can be downloaded from the Acrobat Reader 
Download Center.

For IT administrators (managed environments):

Download the enterprise installers from ftp://ftp.adobe.com/pub/adobe/, or 
refer to the specific release note version for links to installers.

Install updates via your preferred methodology, such as AIP-GPO, bootstrapper,
SCUP/SCCM (Windows), or on Macintosh, Apple Remote Desktop and SSH.

Product 		Track 		Updated Versions 			Platform 		Priority rating Availability

Acrobat DC 		Continuous 	15.010.20056 and earlier versions 	Windows and Macintosh 	2 		Windows https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows
															Macintosh https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Mac
Acrobat Reader DC 	Continuous 	15.010.20056 and earlier versions 	Windows and Macintosh 	2 		Download Center https://get.adobe.com/reader/
Acrobat DC 		Classic 	15.006.30119 and earlier versions 	Windows and Macintosh 	2 		Windows https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows
															Macintosh https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Mac
Acrobat Reader DC 	Classic 	15.006.30119 and earlier versions 	Windows and Macintosh 	2 		Windows http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows
															Macintosh http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Macintosh
Acrobat XI 		Desktop 	11.0.14 and earlier versions 		Windows and Macintosh 	2 		Windows https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows
															Macintosh https://www.adobe.com/support/downloads/product.jsp?product=1&platform=Mac
Reader XI 		Desktop 	11.0.14 and earlier versions 		Windows and Macintosh 	2 		Windows https://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows
															Macintosh https://www.adobe.com/support/downloads/product.jsp?product=10&platform=Mac

Vulnerability Details

These updates resolve use-after-free vulnerabilities that could lead to code 
execution (CVE-2016-0932, CVE-2016-0934, CVE-2016-0937, CVE-2016-0940, 
CVE-2016-0941).

These updates resolve a double-free vulnerability that could lead to code 
execution (CVE-2016-0935, CVE-2016-1111).

These updates resolve memory corruption vulnerabilities that could lead to 
code execution (CVE-2016-0931, CVE-2016-0933, CVE-2016-0936, CVE-2016-0938, 
CVE-2016-0939, CVE-2016-0942, CVE-2016-0944, CVE-2016-0945, CVE-2016-0946).

These updates resolve a method to bypass restrictions on Javascript API 
execution (CVE-2016-0943).

An update to the Adobe Download Manager resolves a vulnerability in the 
directory search path used to find resources that could lead to code execution
(CVE-2016-0947).

Acknowledgments

Adobe would like to thank the following individuals and organizations for 
reporting the relevant issues and for working with Adobe to help protect our 
customers:

AbdulAziz Hariri of HPE's Zero Day Initiative (CVE-2016-0932, CVE-2016-0937, 
CVE-2016-0943)

AbdulAziz Hariri and Jasiel Spelman of HPE's Zero Day Initiative 
(CVE-2016-0941)

Behzad Najjarpour Jabbari, Secunia Research at Flexera Software 
(CVE-2016-0940)

Brian Gorenc of HPE's Zero Day Initiative (CVE-2016-0931)

Chris Navarrete of Fortinet's FortiGuard Labs (CVE-2016-0942)

Jaanus Kp of Clarified Security, working with HPE's Zero Day Initiative 
(CVE-2016-0936, CVE-2016-0938, CVE-2016-0939)

kdot, working with HPE's Zero Day Initiative (CVE-2016-0934, CVE-2016-0935)

Linan Hao of Qihoo 360 Vulcan Team (CVE-2016-0944, CVE-2016-0945, 
CVE-2016-0946)

Mahinthan Chandramohan, Wei Lei and Liu Yang working with iDefense's 
Vulnerability Contributor Program (CVE-2016-0933)

Independently reported by Vladimir Dubrovin, Eric Lawrence, and KeLiu of 
Tencent's Xuanwu LAB (CVE-2016-0947)

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVyLBHX6ZAP0PgtI9AQKAWRAAgSAT/kJNTFgiouvxkwDaeHU9yeoQdkVB
173soDfaVnLhH1GLC/tMyCnorZ/8HvMnEicFAAEPyXly8VNrUms58LDaBnwGGx6V
BqZKwYkjOV8PWnnOco0SXUorUa5RsgkmlFhvt1+hJfgXjKLkK9YKmCbUnuN6CpfE
SjvnXIwIFGoQe0ANAqGaX4TEWMz2KTCUwkM1omansDmVO28xX3aZ6XLfme5hJEnH
ws8o2Tj0ncIG3agkTx365/T/BOdw0/xd8D7ADO7JCvv6ZyS+Hzcj1dTivXS33Cis
sRH6t81Uvdt97C1XV46NZR7F2yGXTJD4y2vJaDNfMTonMxttfpnGHnCekJiV8PKz
8Ad4t5aTLxu3zRnNsb4rchHdF9VllNcbWlnpRPsl69PsXlUcEFqcXfiSLiazWBUR
V8hQTZiQMuKKTHNMIilDmBzImIF+xA5VzNkPJPZ4mMm6GV4LvD0rf/jMOx/6Ylpu
w6tE5D7l8A0RU91roL1AFKG7WHbypWmegaR6w/KdcsZehuySxIADId3uEMiAYI48
qsLUQuTJgNckESouXTfgTxoekLXmyEX1C0179botIZEUW9olGby6N/NjGN5hCWpv
Xm0EQQ/ZeZIUfmeCdW0dO+oCvNlhpPGWpc/P5VwbtjP6W8n1PHtiLzEGNHHHuh93
HzX1gqahaYE=
=Om7q
-----END PGP SIGNATURE-----