Skip to navigation

Security Advisory Critical: acroread security update

Advisory: RHSA-2010:0743-1
Type: Security Advisory
Severity: Critical
Issued on: 2010-10-06
Last updated on: 2010-10-06
Affected Products: RHEL Desktop Supplementary (v. 5 client)
RHEL Supplementary (v. 5 server)
Red Hat Enterprise Linux Extras (v. 4)
Red Hat Enterprise Linux Extras (v. 4.8.z)
CVEs (cve.mitre.org): CVE-2010-2883
CVE-2010-2884
CVE-2010-2887
CVE-2010-2889
CVE-2010-2890
CVE-2010-3619
CVE-2010-3620
CVE-2010-3621
CVE-2010-3622
CVE-2010-3625
CVE-2010-3626
CVE-2010-3627
CVE-2010-3628
CVE-2010-3629
CVE-2010-3630
CVE-2010-3632
CVE-2010-3656
CVE-2010-3657
CVE-2010-3658

Details

Updated acroread packages that fix multiple security issues are now
available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise
Linux 5 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Adobe Reader allows users to view and print documents in Portable Document
Format (PDF).

This update fixes multiple vulnerabilities in Adobe Reader. These
vulnerabilities are detailed on the Adobe security page APSB10-21, listed
in the References section.

A specially-crafted PDF file could cause Adobe Reader to crash or,
potentially, execute arbitrary code as the user running Adobe Reader when
opened. (CVE-2010-2883, CVE-2010-2884, CVE-2010-2889, CVE-2010-2890,
CVE-2010-3619, CVE-2010-3620, CVE-2010-3621, CVE-2010-3622, CVE-2010-3625,
CVE-2010-3626, CVE-2010-3627, CVE-2010-3628, CVE-2010-3629, CVE-2010-3630,
CVE-2010-3632, CVE-2010-3658)

An insecure relative RPATH (runtime library search path) set in some Adobe
Reader libraries could allow a local attacker, who is able to convince
another user to run Adobe Reader in an attacker-controlled directory, to
execute arbitrary code with the privileges of the victim. (CVE-2010-2887)

A specially-crafted PDF file could cause Adobe Reader to crash when opened.
(CVE-2010-3656, CVE-2010-3657)

All Adobe Reader users should install these updated packages. They contain
Adobe Reader version 9.4, which is not vulnerable to these issues. All
running instances of Adobe Reader must be restarted for the update to take
effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Supplementary (v. 5 client)

IA-32:
acroread-9.4.0-1.el5.i386.rpm
File outdated by:  RHSA-2013:1402
    MD5: 87f1dbdd1022f34b3989dc3a4898456d
SHA-256: e530063d7af39c920c784e4459099824b24884d92527c6502a204ed1a7ac5472
acroread-plugin-9.4.0-1.el5.i386.rpm
File outdated by:  RHSA-2013:1402
    MD5: 60dc3a492f7a61d462a1b3ed8a82e5bf
SHA-256: ac95ab60e43afa6c9091f6c13e93201d48556118f67a3e224101abd17128b42f
 
x86_64:
acroread-9.4.0-1.el5.i386.rpm
File outdated by:  RHSA-2013:1402
    MD5: 87f1dbdd1022f34b3989dc3a4898456d
SHA-256: e530063d7af39c920c784e4459099824b24884d92527c6502a204ed1a7ac5472
acroread-plugin-9.4.0-1.el5.i386.rpm
File outdated by:  RHSA-2013:1402
    MD5: 60dc3a492f7a61d462a1b3ed8a82e5bf
SHA-256: ac95ab60e43afa6c9091f6c13e93201d48556118f67a3e224101abd17128b42f
 
RHEL Supplementary (v. 5 server)

IA-32:
acroread-9.4.0-1.el5.i386.rpm
File outdated by:  RHSA-2013:1402
    MD5: 87f1dbdd1022f34b3989dc3a4898456d
SHA-256: e530063d7af39c920c784e4459099824b24884d92527c6502a204ed1a7ac5472
acroread-plugin-9.4.0-1.el5.i386.rpm
File outdated by:  RHSA-2013:1402
    MD5: 60dc3a492f7a61d462a1b3ed8a82e5bf
SHA-256: ac95ab60e43afa6c9091f6c13e93201d48556118f67a3e224101abd17128b42f
 
x86_64:
acroread-9.4.0-1.el5.i386.rpm
File outdated by:  RHSA-2013:1402
    MD5: 87f1dbdd1022f34b3989dc3a4898456d
SHA-256: e530063d7af39c920c784e4459099824b24884d92527c6502a204ed1a7ac5472
acroread-plugin-9.4.0-1.el5.i386.rpm
File outdated by:  RHSA-2013:1402
    MD5: 60dc3a492f7a61d462a1b3ed8a82e5bf
SHA-256: ac95ab60e43afa6c9091f6c13e93201d48556118f67a3e224101abd17128b42f
 
Red Hat Enterprise Linux Extras (v. 4)

IA-32:
acroread-9.4.0-1.el4.i386.rpm
File outdated by:  RHSA-2012:0011
    MD5: 5e82b739a8d027d6ee52b9fcb96353bf
SHA-256: 4b1491e93325ed13a9a8ba4f10c2782919211e25e1b5ef3eda5a7d61ab8250a9
acroread-plugin-9.4.0-1.el4.i386.rpm
File outdated by:  RHSA-2012:0011
    MD5: 7bb550397ebe096a9f18e348c75bf5f9
SHA-256: 8f2f55db7340cf0876af507e14e1ab220094c1e9e050d07c3a78067bb0d153d7
 
x86_64:
acroread-9.4.0-1.el4.i386.rpm
File outdated by:  RHSA-2012:0011
    MD5: 5e82b739a8d027d6ee52b9fcb96353bf
SHA-256: 4b1491e93325ed13a9a8ba4f10c2782919211e25e1b5ef3eda5a7d61ab8250a9
 
Red Hat Enterprise Linux Extras (v. 4.8.z)

IA-32:
acroread-9.4.0-1.el4.i386.rpm
File outdated by:  RHSA-2011:0301
    MD5: 5e82b739a8d027d6ee52b9fcb96353bf
SHA-256: 4b1491e93325ed13a9a8ba4f10c2782919211e25e1b5ef3eda5a7d61ab8250a9
acroread-plugin-9.4.0-1.el4.i386.rpm
File outdated by:  RHSA-2011:0301
    MD5: 7bb550397ebe096a9f18e348c75bf5f9
SHA-256: 8f2f55db7340cf0876af507e14e1ab220094c1e9e050d07c3a78067bb0d153d7
 
x86_64:
acroread-9.4.0-1.el4.i386.rpm
File outdated by:  RHSA-2011:0301
    MD5: 5e82b739a8d027d6ee52b9fcb96353bf
SHA-256: 4b1491e93325ed13a9a8ba4f10c2782919211e25e1b5ef3eda5a7d61ab8250a9
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

632267 - CVE-2010-2883 Acroread: Stack-based buffer overflow by processing certain fonts (APSA10-02)
633917 - CVE-2010-2884 Adobe Flash: crash or potential arbitrary code execution (APSB10-22)
639890 - acroread: multiple code execution flaws (APSB10-21)
639903 - acroread: denial of service flaws (APSB10-21)
639913 - CVE-2010-2887 acroread: use of insecure RPATH (APSB10-21)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/