RHEL 4 / 5 : acroread (RHSA-2010:0743)

High Nessus Plugin ID 49786

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 Supplementary.

The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

Adobe Reader allows users to view and print documents in Portable Document Format (PDF).

This update fixes multiple vulnerabilities in Adobe Reader. These vulnerabilities are detailed on the Adobe security page APSB10-21, listed in the References section.

A specially crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2010-2883, CVE-2010-2884, CVE-2010-2889, CVE-2010-2890, CVE-2010-3619, CVE-2010-3620, CVE-2010-3621, CVE-2010-3622, CVE-2010-3625, CVE-2010-3626, CVE-2010-3627, CVE-2010-3628, CVE-2010-3629, CVE-2010-3630, CVE-2010-3632, CVE-2010-3658)

An insecure relative RPATH (runtime library search path) set in some Adobe Reader libraries could allow a local attacker, who is able to convince another user to run Adobe Reader in an attacker-controlled directory, to execute arbitrary code with the privileges of the victim. (CVE-2010-2887)

A specially crafted PDF file could cause Adobe Reader to crash when opened. (CVE-2010-3656, CVE-2010-3657)

All Adobe Reader users should install these updated packages. They contain Adobe Reader version 9.4, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect.

Solution

Update the affected acroread and / or acroread-plugin packages.

See Also

https://access.redhat.com/security/cve/cve-2010-2883

https://access.redhat.com/security/cve/cve-2010-2884

https://access.redhat.com/security/cve/cve-2010-2887

https://access.redhat.com/security/cve/cve-2010-2889

https://access.redhat.com/security/cve/cve-2010-2890

https://access.redhat.com/security/cve/cve-2010-3619

https://access.redhat.com/security/cve/cve-2010-3620

https://access.redhat.com/security/cve/cve-2010-3621

https://access.redhat.com/security/cve/cve-2010-3622

https://access.redhat.com/security/cve/cve-2010-3625

https://access.redhat.com/security/cve/cve-2010-3626

https://access.redhat.com/security/cve/cve-2010-3627

https://access.redhat.com/security/cve/cve-2010-3628

https://access.redhat.com/security/cve/cve-2010-3629

https://access.redhat.com/security/cve/cve-2010-3630

https://access.redhat.com/security/cve/cve-2010-3632

https://access.redhat.com/security/cve/cve-2010-3656

https://access.redhat.com/security/cve/cve-2010-3657

https://access.redhat.com/security/cve/cve-2010-3658

https://www.adobe.com/support/security/bulletins/apsb10-21.html

https://access.redhat.com/errata/RHSA-2010:0743

Plugin Details

Severity: High

ID: 49786

File Name: redhat-RHSA-2010-0743.nasl

Version: 1.30

Type: local

Agent: unix

Published: 2010/10/07

Updated: 2018/11/28

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:acroread, p-cpe:/a:redhat:enterprise_linux:acroread-plugin, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:4.8, cpe:/o:redhat:enterprise_linux:5

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/10/06

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Adobe CoolType SING Table "uniqueName" Stack Buffer Overflow)

ExploitHub (EH-11-971)

Reference Information

CVE: CVE-2010-2883, CVE-2010-2884, CVE-2010-2887, CVE-2010-2889, CVE-2010-2890, CVE-2010-3619, CVE-2010-3620, CVE-2010-3621, CVE-2010-3622, CVE-2010-3625, CVE-2010-3626, CVE-2010-3627, CVE-2010-3628, CVE-2010-3629, CVE-2010-3630, CVE-2010-3632, CVE-2010-3656, CVE-2010-3657, CVE-2010-3658

BID: 43057, 43205, 43722, 43723, 43724, 43725, 43726, 43727, 43729, 43730, 43732, 43734, 43735, 43737, 43738, 43740, 43741, 43744, 43746

RHSA: 2010:0743