Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 200904-17 ] Adobe Reader: User-assisted execution of arbitrary code
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Advocate
Advocate


Joined: 12 May 2004
Posts: 2663

PostPosted: Sat Apr 18, 2009 11:26 am    Post subject: [ GLSA 200904-17 ] Adobe Reader: User-assisted execution of Reply with quote

Gentoo Linux Security Advisory

Title: Adobe Reader: User-assisted execution of arbitrary code (GLSA 200904-17)
Severity: normal
Exploitable: remote
Date: April 18, 2009
Bug(s): #259992
ID: 200904-17

Synopsis

Adobe Reader is vulnerable to execution of arbitrary code.

Background

Adobe Reader (formerly Adobe Acrobat Reader) is a closed-source PDF reader.

Affected Packages

Package: app-text/acroread
Vulnerable: < 8.1.4
Unaffected: >= 8.1.4
Architectures: All supported architectures


Description

Multiple vulnerabilities have been discovered in Adobe Reader:
  • Alin Rad Pop of Secunia Research reported a heap-based buffer overflow when processing PDF files containing a malformed JBIG2 symbol dictionary segment (CVE-2009-0193).
  • A buffer overflow related to a non-JavaScript function call and possibly an embedded JBIG2 image stream has been reported (CVE-2009-0658).
  • Tenable Network Security reported a stack-based buffer overflow that can be triggered via a crafted argument to the getIcon() method of a Collab object (CVE-2009-0927).
  • Sean Larsson of iDefense Labs reported a heap-based buffer overflow when processing a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table (CVE-2009-0928).
  • Jonathan Brossard of the iViZ Security Research Team reported an unspecified vulnerability related to JBIG2 and input validation (CVE-2009-1061).
  • Will Dormann of CERT/CC reported a vulnerability lading to memory corruption related to JBIG2 (CVE-2009-1062).


Impact

A remote attacker could entice a user to open a specially crafted PDF document, possibly leading to the execution of arbitrary code with the privileges of the user running the application, or a Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All Adobe Reader users should upgrade to the latest version:
Code:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.4"


References

CVE-2009-0193
CVE-2009-0658
CVE-2009-0927
CVE-2009-0928
CVE-2009-1061
CVE-2009-1062
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum