SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Adobe Acrobat/Reader Vendors:   Adobe Systems Incorporated
Adobe Reader Multiple Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1023852
SecurityTracker URL:  http://securitytracker.com/id/1023852
CVE Reference:   CVE-2010-0190, CVE-2010-0191, CVE-2010-0192, CVE-2010-0193, CVE-2010-0194, CVE-2010-0195, CVE-2010-0196, CVE-2010-0197, CVE-2010-0198, CVE-2010-0199, CVE-2010-0201, CVE-2010-0202, CVE-2010-0203, CVE-2010-0204, CVE-2010-1241   (Links to External Site)
Date:  Apr 13 2010
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.3.1 and prior versions
Description:   Multiple vulnerabilities were reported in Adobe Reader. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a buffer overflow, memory corruption, prefix protocol handler, font handling, or cross-site scripting flaw and execute arbitrary code on the target system. The code will run with the privileges of the target user.

The following researchers reported these vulnerabilities:

Billy Rios and Microsoft Vulnerability Research (MSVR); Aki Helin of Oulu University Secure Programming Group; Haifei Li and Bing Liu of Fortinet's FortiGuard Labs; An anonymous researcher via TippingPoint's Zero Day Initiative; Vulnerability Research Team, TELUS Security Labs; James Quirk of Los Alamos, New Mexico; Nicolas Joly of VUPEN Vulnerability Research Team; Felipe Andres Manzano via the iSIGHT Partners Global Vulnerability Partnership.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix (9.3.2).

The vendor's advisory is available at:

http://www.adobe.com/support/security/bulletins/apsb10-09.html

Vendor URL:  http://www.adobe.com/support/security/bulletins/apsb10-09.html (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:   Linux (Any), UNIX (OS X), UNIX (Solaris - SunOS), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 14 2010 (Red Hat Issues Fix) Adobe Reader Multiple Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 4 and 5.



 Source Message Contents

Date:  Tue, 13 Apr 2010 19:07:13 +0000
Subject:  Adobe Reader / Adobe Acrobat


http://www.adobe.com/support/security/bulletins/apsb10-09.html

APSB10-09

CVE-2010-0190, CVE-2010-0191, CVE-2010-0192, CVE-2010-0193, CVE-2010-0194, 
CVE-2010-0195, CVE-2010-0196, CVE-2010-0197, CVE-2010-0198, CVE-2010-0199, 
CVE-2010-0201, CVE-2010-0202, CVE-2010-0203, CVE-2010-0204, CVE-2010-1241
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC