GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Aug 09, 2008 11:26 pm Post subject: [ GLSA 200808-10 ] Adobe Reader: User-assisted execution of |
|
|
Gentoo Linux Security Advisory
Title: Adobe Reader: User-assisted execution of arbitrary code (GLSA 200808-10)
Severity: normal
Exploitable: remote
Date: August 09, 2008
Bug(s): #233383
ID: 200808-10
Synopsis
Adobe Reader is vulnerable to execution of arbitrary code via a crafted
PDF.
Background
Adobe Reader (formerly Adobe Acrobat Reader) is a closed-source PDF
reader.
Affected Packages
Package: app-text/acroread
Vulnerable: < 8.1.2-r3
Unaffected: >= 8.1.2-r3
Architectures: All supported architectures
Description
The Johns Hopkins University Applied Physics Laboratory reported that
input to an unspecified JavaScript method is not properly validated.
Impact
A remote attacker could entice a user to open a specially crafted PDF
document, possibly resulting in the remote execution of arbitrary code
with the privileges of the user.
Workaround
There is no known workaround at this time.
Resolution
All Adobe Reader users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.2-r3" |
References
CVE-2008-2641
Last edited by GLSA on Sat May 17, 2014 4:27 am; edited 2 times in total |
|