SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Adobe Acrobat/Reader Vendors:   Adobe Systems Incorporated
(Red Hat Issues Fix) Adobe Reader Stack Overflows, Insecure Methods, Unsafe Library Path, and Other Bugs Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1019492
SecurityTracker URL:  http://securitytracker.com/id/1019492
CVE Reference:   CVE-2007-5659, CVE-2007-5663, CVE-2007-5666, CVE-2008-0655, CVE-2008-0667, CVE-2008-0726   (Links to External Site)
Date:  Feb 22 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Several vulnerabilities were reported in Adobe Reader. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted PDF file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

Stack overflows exist in JavaScript methods [CVE-2007-5659].

An insecure method exists in the JavaScript library [CVE-2007-5663].

An unsafe library path for "Security Provider" libraries exists [CVE-2007-5666].

An integer overflow exists in a JavaScript function [CVE-2008-0726].

A vulnerability in the Javascript DOC.print() function lets remote users control printers [CVE-2008-0667].

Acrobat and Adobe Reader 7.0.9 and prior versions are also affected by some of these vulnerabilities.

Tavis Ormandy and Will Drewry of the Google Security Team, cocoruder of Fortinet Security Research Team, Greg MacManus of iDefense Labs, and Paul Craig of Security-Assessment.com reported these vulnerabilities. An anonymous researcher reported one vulnerability via TippingPoint.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   Red Hat has released a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2008-0144.html

Vendor URL:  www.adobe.com/support/security/bulletins/apsb08-13.html (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Red Hat Enterprise)

Message History:   This archive entry is a follow-up to the message listed below.
Feb 8 2008 Adobe Reader Stack Overflows, Insecure Methods, Unsafe Library Path, and Other Bugs Let Remote Users Execute Arbitrary Code



 Source Message Contents

Date:  Fri, 22 Feb 2008 12:00:13 -0500
Subject:  [RHSA-2008:0144-01] Critical: acroread security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Critical: acroread security update
Advisory ID:       RHSA-2008:0144-01
Product:           Red Hat Enterprise Linux Extras
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2008-0144.html
Issue date:        2008-02-22
CVE Names:         CVE-2007-5659 CVE-2007-5663 CVE-2007-5666 
                   CVE-2007-0044 CVE-2008-0655 CVE-2008-0667 
                   CVE-2008-0726 
=====================================================================

1. Summary:

Updated acroread packages that fix several security issues are now
available for Red Hat Enterprise Linux 3, 4, and 5.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 Extras - i386, x86_64
Red Hat Desktop version 3 Extras - i386, x86_64
Red Hat Enterprise Linux ES version 3 Extras - i386, x86_64
Red Hat Enterprise Linux WS version 3 Extras - i386, x86_64
Red Hat Enterprise Linux AS version 4 Extras - i386, x86_64
Red Hat Desktop version 4 Extras - i386, x86_64
Red Hat Enterprise Linux ES version 4 Extras - i386, x86_64
Red Hat Enterprise Linux WS version 4 Extras - i386, x86_64
RHEL Desktop Supplementary (v. 5 client) - i386, x86_64
RHEL Supplementary (v. 5 server) - i386, x86_64

3. Description:

The Adobe Reader allows users to view and print documents in portable
document format (PDF).

Several flaws were found in the way Adobe Reader processed malformed PDF
files. An attacker could create a malicious PDF file which could execute
arbitrary code if opened by a victim. (CVE-2007-5659, CVE-2007-5663,
CVE-2007-5666, CVE-2008-0726)

A flaw was found in the way the Adobe Reader browser plug-in honored
certain requests. A malicious PDF file could cause the browser to request
an unauthorized URL, allowing for a cross-site request forgery attack.
(CVE-2007-0044)

A flaw was found in Adobe Reader's JavaScript API DOC.print function. A
malicious PDF file could silently trigger non-interactive printing of the
document, causing multiple copies to be printed without the users consent.
(CVE-2008-0667)

Additionally, this update fixes multiple unknown flaws in Adobe Reader.
When the information regarding these flaws is made public by Adobe, it will
be added to this advisory. (CVE-2008-0655)

Note: Adobe have yet to release security fixed versions of Adobe 7. All
users of Adobe Reader are, therefore, advised to install these updated
packages. They contain Adobe Reader version 8.1.2, which is not vulnerable
to these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bugs fixed (http://bugzilla.redhat.com/):

223113 - CVE-2007-0044 Acrobat Reader Universal CSRF and session riding
431985 - CVE-2008-0655 acroread: unspecified vulnerabilities
432471 - CVE-2008-0667 acroread: silent print vulnerability
432629 - CVE-2007-5659 acroread Multiple buffer overflows
432630 - CVE-2007-5663 acroread JavaScript Insecure Method Exposure
432632 - CVE-2007-5666 acroread JavaScript Insecure Libary Search Path
432757 - CVE-2008-0726 Acroread memory corruption

6. Package List:

Red Hat Enterprise Linux AS version 3 Extras:

i386:
acroread-8.1.2-1.el3.6.i386.rpm
acroread-plugin-8.1.2-1.el3.6.i386.rpm

x86_64:
acroread-8.1.2-1.el3.6.i386.rpm

Red Hat Desktop version 3 Extras:

i386:
acroread-8.1.2-1.el3.6.i386.rpm
acroread-plugin-8.1.2-1.el3.6.i386.rpm

x86_64:
acroread-8.1.2-1.el3.6.i386.rpm

Red Hat Enterprise Linux ES version 3 Extras:

i386:
acroread-8.1.2-1.el3.6.i386.rpm
acroread-plugin-8.1.2-1.el3.6.i386.rpm

x86_64:
acroread-8.1.2-1.el3.6.i386.rpm

Red Hat Enterprise Linux WS version 3 Extras:

i386:
acroread-8.1.2-1.el3.6.i386.rpm
acroread-plugin-8.1.2-1.el3.6.i386.rpm

x86_64:
acroread-8.1.2-1.el3.6.i386.rpm

Red Hat Enterprise Linux AS version 4 Extras:

i386:
acroread-8.1.2-1.el4.2.i386.rpm
acroread-plugin-8.1.2-1.el4.2.i386.rpm

x86_64:
acroread-8.1.2-1.el4.2.i386.rpm

Red Hat Desktop version 4 Extras:

i386:
acroread-8.1.2-1.el4.2.i386.rpm
acroread-plugin-8.1.2-1.el4.2.i386.rpm

x86_64:
acroread-8.1.2-1.el4.2.i386.rpm

Red Hat Enterprise Linux ES version 4 Extras:

i386:
acroread-8.1.2-1.el4.2.i386.rpm
acroread-plugin-8.1.2-1.el4.2.i386.rpm

x86_64:
acroread-8.1.2-1.el4.2.i386.rpm

Red Hat Enterprise Linux WS version 4 Extras:

i386:
acroread-8.1.2-1.el4.2.i386.rpm
acroread-plugin-8.1.2-1.el4.2.i386.rpm

x86_64:
acroread-8.1.2-1.el4.2.i386.rpm

RHEL Desktop Supplementary (v. 5 client):

i386:
acroread-8.1.2-1.el5.3.i386.rpm
acroread-plugin-8.1.2-1.el5.3.i386.rpm

x86_64:
acroread-8.1.2-1.el5.3.i386.rpm
acroread-plugin-8.1.2-1.el5.3.i386.rpm

RHEL Supplementary (v. 5 server):

i386:
acroread-8.1.2-1.el5.3.i386.rpm
acroread-plugin-8.1.2-1.el5.3.i386.rpm

x86_64:
acroread-8.1.2-1.el5.3.i386.rpm
acroread-plugin-8.1.2-1.el5.3.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5659
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5663
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5666
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0655
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0667
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0726
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2008 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHvv90XlSAg2UNWIIRAmsAAJsGwERLrCU4RaHJU3wzn8nBdSkcBACdGLS2
aS9vgj1R4bYqskDdOH8lsdQ=
=qrEO
-----END PGP SIGNATURE-----


-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC