RHEL 4 / 5 : acroread (RHSA-2010:0743)

high Nessus Plugin ID 49786

Language:

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 Supplementary.

The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

Adobe Reader allows users to view and print documents in Portable Document Format (PDF).

This update fixes multiple vulnerabilities in Adobe Reader. These vulnerabilities are detailed on the Adobe security page APSB10-21, listed in the References section.

A specially crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2010-2883, CVE-2010-2884, CVE-2010-2889, CVE-2010-2890, CVE-2010-3619, CVE-2010-3620, CVE-2010-3621, CVE-2010-3622, CVE-2010-3625, CVE-2010-3626, CVE-2010-3627, CVE-2010-3628, CVE-2010-3629, CVE-2010-3630, CVE-2010-3632, CVE-2010-3658)

An insecure relative RPATH (runtime library search path) set in some Adobe Reader libraries could allow a local attacker, who is able to convince another user to run Adobe Reader in an attacker-controlled directory, to execute arbitrary code with the privileges of the victim. (CVE-2010-2887)

A specially crafted PDF file could cause Adobe Reader to crash when opened. (CVE-2010-3656, CVE-2010-3657)

All Adobe Reader users should install these updated packages. They contain Adobe Reader version 9.4, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect.

Solution

Update the affected acroread and / or acroread-plugin packages.

See Also

https://access.redhat.com/security/cve/cve-2010-2887

https://access.redhat.com/security/cve/cve-2010-2889

https://access.redhat.com/security/cve/cve-2010-2890

https://access.redhat.com/security/cve/cve-2010-3619

https://access.redhat.com/security/cve/cve-2010-3620

https://access.redhat.com/security/cve/cve-2010-3621

https://access.redhat.com/security/cve/cve-2010-3622

https://access.redhat.com/security/cve/cve-2010-3625

https://access.redhat.com/security/cve/cve-2010-3626

https://access.redhat.com/security/cve/cve-2010-3627

https://access.redhat.com/security/cve/cve-2010-3628

https://access.redhat.com/security/cve/cve-2010-3629

https://access.redhat.com/security/cve/cve-2010-3630

https://access.redhat.com/security/cve/cve-2010-3632

https://access.redhat.com/security/cve/cve-2010-3656

https://access.redhat.com/security/cve/cve-2010-3657

https://access.redhat.com/security/cve/cve-2010-3658

https://www.adobe.com/support/security/bulletins/apsb10-21.html

https://access.redhat.com/errata/RHSA-2010:0743

https://access.redhat.com/security/cve/cve-2010-2883

https://access.redhat.com/security/cve/cve-2010-2884

Plugin Details

Severity: High

ID: 49786

File Name: redhat-RHSA-2010-0743.nasl

Version: 1.35

Type: local

Agent: unix

Published: 10/7/2010

Updated: 6/8/2022

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.6

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2010-3658

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:acroread, p-cpe:/a:redhat:enterprise_linux:acroread-plugin, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.8, cpe:/o:redhat:enterprise_linux:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/6/2010

Vulnerability Publication Date: 9/9/2010

CISA Known Exploited Vulnerability Due Dates: 6/22/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow)

ExploitHub (EH-11-971)

Reference Information

CVE: CVE-2010-2883, CVE-2010-2884, CVE-2010-2887, CVE-2010-2889, CVE-2010-2890, CVE-2010-3619, CVE-2010-3620, CVE-2010-3621, CVE-2010-3622, CVE-2010-3625, CVE-2010-3626, CVE-2010-3627, CVE-2010-3628, CVE-2010-3629, CVE-2010-3630, CVE-2010-3632, CVE-2010-3656, CVE-2010-3657, CVE-2010-3658

BID: 43057, 43205, 43722, 43723, 43724, 43725, 43726, 43727, 43729, 43730, 43732, 43734, 43735, 43737, 43738, 43740, 43741, 43744, 43746

RHSA: 2010:0743