Bug 720622 (APSB11-16, CVE-2011-2094, CVE-2011-2095, CVE-2011-2096, CVE-2011-2097, CVE-2011-2098, CVE-2011-2099, CVE-2011-2101)

Summary: acroread: multiple code execution flaws (APSB11-16)
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: mkasik, security-response-team, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-11-14 23:10:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 720636    

Description Jan Lieskovsky 2011-07-12 09:53:30 UTC
Adobe security bulletin APSB11-16 describes multiple security flaws that can lead to arbitrary code execution when a malicious PDF file is opened in Adobe Reader.

http://www.adobe.com/support/security/bulletins/apsb11-16.html

These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2011-2094).

These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2011-2095).

These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2011-2096).

These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2011-2097).

These updates resolve a memory corruption vulnerability that could lead to code execution (CVE-2011-2098).

These updates resolve a memory corruption vulnerability that could lead to code execution (CVE-2011-2099).

These updates resolve a cross document script execution vulnerability that could lead to code execution (CVE-2011-2101).

Adobe Reader 9.x package updates for Linux operating system are expected on 13-th September, 2011.

Comment 1 Jan Lieskovsky 2011-07-12 09:58:20 UTC
The following flaws, corrected by APSB11-16:
http://www.adobe.com/support/security/bulletins/apsb11-16.html

are NOT applicable to Adobe Reader 9.x package for Linux operating system:

* These updates resolve a DLL loading vulnerability that could lead to code execution (CVE-2011-2100).

* These updates resolve a memory corruption vulnerability that could lead to code execution (CVE-2011-2103).
Note: Affects 8.x versions only.

* These updates resolve a memory corruption vulnerability that could lead to code execution (Macintosh only) (CVE-2011-2106).

Comment 3 Jan Lieskovsky 2011-07-12 10:16:49 UTC
Adobe APSB11-16 security bulletin is stating to correct also flaws from:
1) APSB11-12 - http://www.adobe.com/support/security/bulletins/apsb11-12.html

   These flaws have got dedicated Red Hat Bugzilla issue tracking system entry:
   [1] https://bugzilla.redhat.com/show_bug.cgi?id=APSB11-12

   and flaw from

2) APSB11-13 - http://www.adobe.com/support/security/bulletins/apsb11-13.html

   This flaw have got a separate Red Hat Bugzilla issue tracking system record:
   [2] https://bugzilla.redhat.com/show_bug.cgi?id=APSB11-13

Comment 5 Jan Lieskovsky 2011-09-13 09:44:38 UTC
(In reply to comment #0)
> Adobe Reader 9.x package updates for Linux operating system are expected on
> 13-th September, 2011.

The release date of upcoming upstream Adobe Reader 9.x update for Linux operating system has been moved to Monday, 7-th November, 2011.

Comment 6 Vincent Danen 2011-11-14 23:10:45 UTC
This issue has been addressed in following products:

  Extras for RHEL 4
  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2011:1434 https://rhn.redhat.com/errata/RHSA-2011-1434.html


(Adobe did not make clear, until today, that APSB11-16 was addressed in Adobe Reader 9.4.6; their bulletin was updated today to indicate that they were in fact addressed.)