Jump to content


Photo

Security updates:Adobe Reader/Acrobat (APSB11-24)


  • Please log in to reply
No replies to this topic

#1 Chachazz

Chachazz

    Is GSF inventory

  • General Admin
  • 33,517 posts

Posted 14 September 2011 - 01:52 AM

DigiNotar removed from Adobe Approved Trust List (AATL) - Adobe PSIRT
September 13, 2011

As discussed on the Security Matters blog, the Adobe Approved Trust List (AATL) has been updated to remove the certificate authority DigiNotar. Users of Adobe Reader and Acrobat X (version 10.x) will be automatically updated to this list. A future product update of Adobe Reader and Acrobat version 9.x will enable dynamic updates of the AATL. In the meantime, users of Adobe Reader and Acrobat 9 can manually remove DigiNotar using instructions provided in the blog post.
-------------------------------------------------------------------
Security Bulletin (APSB11-24)
Critical vulnerabilities have been identified in Adobe Reader X (10.1) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.2 and earlier versions for UNIX, and Adobe Acrobat X (10.1) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system.

Adobe recommends users of Adobe Reader X (10.1) and earlier versions for Windows and Macintosh update to Adobe Reader X (10.1.1). For users of Adobe Reader 9.4.5 and earlier versions for Windows and Macintosh, who cannot update to Adobe Reader X (10.1.1), Adobe has made available updates, Adobe Reader 9.4.6 and Adobe Reader 8.3.1. Adobe recommends users of Adobe Acrobat X (10.1) for Windows and Macintosh update to Adobe Acrobat X (10.1.1). Adobe recommends users of Adobe Acrobat 9.4.5 and earlier versions for Windows and Macintosh update to Adobe Acrobat 9.4.6, and users of Adobe Acrobat 8.3 and earlier versions for Windows and Macintosh update to Adobe Acrobat 8.3.1. Adobe Reader 9.4.6 for UNIX is currently scheduled to be released on November 7, 2011.

Affected software versions
Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh
Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX
Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh
Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh
Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh
Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh

Solution
Adobe recommends users update their software installations by following the instructions below:
http://www.adobe.com.../apsb11-24.html
The next quarterly security updates for Adobe Reader and Acrobat are currently scheduled for December 13, 2011.

Note: Support for Adobe Reader 8.x and Acrobat 8.x for Windows and Macintosh will end on November 3, 2011.
For more information, please see: Adobe Reader and Acrobat 8 End of Support
  • These updates resolve a local privilege-escalation vulnerability (Adobe Reader X (10.x) on Windows only) (CVE-2011-1353).
  • These updates resolve a security bypass vulnerability that could lead to code execution (CVE-2011-2431).
  • These updates resolve a buffer overflow vulnerability in the U3D TIFF Resource that could lead to code execution (CVE-2011-2432).
  • These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2011-2433).
  • These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2011-2434).
  • These updates resolve an buffer overflow vulnerability that could lead to code execution (CVE-2011-2435).
  • These updates resolve a heap overflow vulnerability in the Adobe image parsing library that could lead to code execution (CVE-2011-2436).
  • These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2011-2437).
  • These updates resolve three stack overflow vulnerabilities in the Adobe image parsing library that could lead to code execution (CVE-2011-2438).
  • These updates resolve a memory leakage condition vulnerability that could lead to code execution (CVE-2011-2439).
  • These updates resolve a use-after-free vulnerability that could lead to code execution (CVE-2011-2440).
  • These updates resolve two stack overflow vulnerabilities in the CoolType.dll library that could lead to code execution (CVE-2011-2441).
  • These updates resolve a logic error vulnerability that could lead to code execution (CVE-2011-2442).
  • These updates also incorporate the Adobe Flash Player updates as noted in Security Bulletin APSB11-21.
  • These updates also incorporate the Adobe Flash Player updates as noted in Security Bulletin APSB11-21.
  • The next quarterly security updates for Adobe Reader and Acrobat are currently scheduled for December 13, 2011.
http://www.adobe.com.../apsb11-24.html



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users