Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200904-17 ] Adobe Reader: User-assisted execution of arbitrary code
Date: Sat, 18 Apr 2009 11:21:40
Message-Id: 200904181311.48413.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200904-17
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Adobe Reader: User-assisted execution of arbitrary code
9 Date: April 18, 2009
10 Bugs: #259992
11 ID: 200904-17
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Adobe Reader is vulnerable to execution of arbitrary code.
19
20 Background
21 ==========
22
23 Adobe Reader (formerly Adobe Acrobat Reader) is a closed-source PDF
24 reader.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 app-text/acroread < 8.1.4 >= 8.1.4
33
34 Description
35 ===========
36
37 Multiple vulnerabilities have been discovered in Adobe Reader:
38
39 * Alin Rad Pop of Secunia Research reported a heap-based buffer
40 overflow when processing PDF files containing a malformed JBIG2
41 symbol dictionary segment (CVE-2009-0193).
42
43 * A buffer overflow related to a non-JavaScript function call and
44 possibly an embedded JBIG2 image stream has been reported
45 (CVE-2009-0658).
46
47 * Tenable Network Security reported a stack-based buffer overflow
48 that can be triggered via a crafted argument to the getIcon() method
49 of a Collab object (CVE-2009-0927).
50
51 * Sean Larsson of iDefense Labs reported a heap-based buffer overflow
52 when processing a PDF file containing a JBIG2 stream with a size
53 inconsistency related to an unspecified table (CVE-2009-0928).
54
55 * Jonathan Brossard of the iViZ Security Research Team reported an
56 unspecified vulnerability related to JBIG2 and input validation
57 (CVE-2009-1061).
58
59 * Will Dormann of CERT/CC reported a vulnerability lading to memory
60 corruption related to JBIG2 (CVE-2009-1062).
61
62 Impact
63 ======
64
65 A remote attacker could entice a user to open a specially crafted PDF
66 document, possibly leading to the execution of arbitrary code with the
67 privileges of the user running the application, or a Denial of Service.
68
69 Workaround
70 ==========
71
72 There is no known workaround at this time.
73
74 Resolution
75 ==========
76
77 All Adobe Reader users should upgrade to the latest version:
78
79 # emerge --sync
80 # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.4"
81
82 References
83 ==========
84
85 [ 1 ] CVE-2009-0193
86 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0193
87 [ 2 ] CVE-2009-0658
88 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0658
89 [ 3 ] CVE-2009-0927
90 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0927
91 [ 4 ] CVE-2009-0928
92 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0928
93 [ 5 ] CVE-2009-1061
94 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1061
95 [ 6 ] CVE-2009-1062
96 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1062
97
98 Availability
99 ============
100
101 This GLSA and any updates to it are available for viewing at
102 the Gentoo Security Website:
103
104 http://security.gentoo.org/glsa/glsa-200904-17.xml
105
106 Concerns?
107 =========
108
109 Security is a primary focus of Gentoo Linux and ensuring the
110 confidentiality and security of our users machines is of utmost
111 importance to us. Any security concerns should be addressed to
112 security@g.o or alternatively, you may file a bug at
113 http://bugs.gentoo.org.
114
115 License
116 =======
117
118 Copyright 2009 Gentoo Foundation, Inc; referenced text
119 belongs to its owner(s).
120
121 The contents of this document are licensed under the
122 Creative Commons - Attribution / Share Alike license.
123
124 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature