SUSE SLED10 Security Update : Acrobat Reader (SUSE-SU-2013:0044-1)

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote SUSE host is missing one or more security updates.

Description :

Acrobat Reader was updated to 9.5.3 to fix various bugs and security
issues.

More information can be found at
http://www.adobe.com/support/security/bulletins/apsb13-02.html

The resolved security issues are CVE-2012-1530 , CVE-2013-0601 ,
CVE-2013-0602 , CVE-2013-0603 , CVE-2013-0604 , CVE-2013-0605 ,
CVE-2013-0606 , CVE-2013-0607 , CVE-2013-0608 , CVE-2013-0609 ,
CVE-2013-0610 , CVE-2013-0611 , CVE-2013-0612 , CVE-2013-0613 ,
CVE-2013-0614 , CVE-2013-0615 , CVE-2013-0616 , CVE-2013-0617 ,
CVE-2013-0618 , CVE-2013-0619 , CVE-2013-0620 , CVE-2013-0621 ,
CVE-2013-0622 , CVE-2013-0623 , CVE-2013-0624 , CVE-2013-0626 and
CVE-2013-0627 .

Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1530
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0601
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0602
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0603
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0604
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0605
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0606
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0607
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0608
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0609
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0610
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0611
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0612
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0613
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0614
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0615
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0616
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0617
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0618
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0619
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0620
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0621
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0622
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0623
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0624
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0626
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0627
http://www.nessus.org/u?98b55da7
http://support.novell.com/security/cve/CVE-2012-1530.html
http://support.novell.com/security/cve/CVE-2013-0601.html
http://support.novell.com/security/cve/CVE-2013-0602.html
http://support.novell.com/security/cve/CVE-2013-0603.html
http://support.novell.com/security/cve/CVE-2013-0604.html
http://support.novell.com/security/cve/CVE-2013-0605.html
http://support.novell.com/security/cve/CVE-2013-0606.html
http://support.novell.com/security/cve/CVE-2013-0607.html
http://support.novell.com/security/cve/CVE-2013-0608.html
http://support.novell.com/security/cve/CVE-2013-0609.html
http://support.novell.com/security/cve/CVE-2013-0610.html
http://support.novell.com/security/cve/CVE-2013-0611.html
http://support.novell.com/security/cve/CVE-2013-0612.html
http://support.novell.com/security/cve/CVE-2013-0613.html
http://support.novell.com/security/cve/CVE-2013-0614.html
http://support.novell.com/security/cve/CVE-2013-0615.html
http://support.novell.com/security/cve/CVE-2013-0616.html
http://support.novell.com/security/cve/CVE-2013-0617.html
http://support.novell.com/security/cve/CVE-2013-0618.html
http://support.novell.com/security/cve/CVE-2013-0619.html
http://support.novell.com/security/cve/CVE-2013-0620.html
http://support.novell.com/security/cve/CVE-2013-0621.html
http://support.novell.com/security/cve/CVE-2013-0622.html
http://support.novell.com/security/cve/CVE-2013-0623.html
http://support.novell.com/security/cve/CVE-2013-0624.html
http://support.novell.com/security/cve/CVE-2013-0626.html
http://support.novell.com/security/cve/CVE-2013-0627.html
http://www.adobe.com/support/security/bulletins/apsb13-02.html
https://bugzilla.novell.com/797529
http://www.nessus.org/u?fd281609

Solution :

Update the affected Acrobat Reader package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true