(Gentoo Issues Fix) Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1027196 |
SecurityTracker URL: http://securitytracker.com/id/1027196
|
CVE Reference:
CVE-2012-0774, CVE-2012-0775, CVE-2012-0776, CVE-2012-0777
(Links to External Site)
|
Date: Jun 22 2012
|
Impact:
Execution of arbitrary code via network, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 9.5 and prior versions; 10.1.2 and prior versions
|
Description:
Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote user can cause arbitrary code to be executed on the target user's system.
A remote user can create a specially crafted file that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the target user.
An integer overflow in True Type Font (TTF) handling can cause code execution [CVE-2012-0774].
A memory corruption error in JavaScript handling can cause code execution [CVE-2012-0775].
A security bypass via the Adobe Reader installer can cause code execution [CVE-2012-0776].
A memory corruption error in the JavaScript API can cause code execution on Mac OS X and Linux systems [CVE-2012-0777].
Peter Vreugdenhil, HP DVLabs, Soroush Dalili, Mitja Kolsek of ACROS Security, and James Quirk, Los Alamos, reported these vulnerabilities.
|
Impact:
A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
|
Solution:
Gentoo has issued a fix.
The Gentoo advisory is available at:
http://security.gentoo.org/glsa/glsa-201206-14.xml
|
Vendor URL: www.adobe.com/support/security/bulletins/apsb12-08.html (Links to External Site)
|
Cause:
Access control error, Boundary error
|
Underlying OS: Linux (Gentoo)
|
|
Message History:
This archive entry is a follow-up to the message listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|