Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 528659 - (CVE-2009-2980, CVE-2009-2983, CVE-2009-2985, CVE-2009-2986, CVE-2009-2990, CVE-2009-2991, CVE-2009-2993, CVE-2009-2994, CVE-2009-2996, CVE-2009-2997, CVE-2009-2998, CVE-2009-3458, CVE-2009-3462) acroread: Multiple arbitrary code execution fixes in 8.1.7 (APSB09-15)
acroread: Multiple arbitrary code execution fixes in 8.1.7 (APSB09-15)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
urgent Severity urgent
: ---
: ---
Assigned To: Red Hat Product Security
http://www.adobe.com/support/security...
impact=critical,reported=20091013,pub...
: Security
Depends On: 528074 528075 528076
Blocks:
  Show dependency treegraph
 
Reported: 2009-10-13 04:50 EDT by Jan Lieskovsky
Modified: 2009-10-19 11:20 EDT (History)
5 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2009-10-15 03:41:58 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:1499 normal SHIPPED_LIVE Critical: acroread security update 2009-10-14 11:36:28 EDT

  None (edit)
Description Jan Lieskovsky 2009-10-13 04:50:04 EDT
Adobe has published a security bulletin APSB09-15 for security issues,
leading to arbitrary code execution, addressed in Adobe Reader and Acrobat products:

  http://www.adobe.com/support/security/bulletins/apsb09-15.html

Quoting Adobe bulletin APSB09-15 for issues descriptions:

  This update resolves a third party web download product that Adobe Reader 
  uses that could potentially lead to code execution (CVE-2009-2564).

  This update resolves an integer overflow that leads to a Denial of Service 
  (DoS); arbitrary code execution has not been demonstrated, but may be 
  possible (CVE-2009-2980).

  This update resolves a memory corruption issue that leads to a Denial of 
  Service (DoS); arbitrary code execution has not been demonstrated, but
  may be possible (CVE-2009-2983).

  This update resolves a memory corruption issue that could potentially
  lead to code execution (CVE-2009-2985).

  This update resolves multiple heap overflow vulnerabilities that could   
  potentially lead to code execution (CVE-2009-2986).

  This update resolves an integer overflow that could potentially lead
  to code execution (CVE-2009-2989).

  This update resolves an invalid array index issue that could potentially 
  lead to code execution (CVE-2009-2990).

  This update resolves a remote exploitation issue specific to the Mozilla 
  plug-in that could potentially allow an attacker to execute arbitrary code 
  with the privileges of the current user (CVE-2009-2991).

  This update resolves multiple input validation vulnerabilities that
  could potentially lead to code execution (CVE-2009-2993).

  This update resolves a buffer overflow issue that could potentially lead to 
  code execution (CVE-2009-2994).

  This update resolves a memory corruption issue that leads to a Denial of
   Service (DoS); arbitrary code execution has not been demonstrated, but
   may be possible (CVE-2009-2996).

  This update resolves a heap overflow vulnerability that could potentially 
  lead to code execution (CVE-2009-2997).

  This update resolves an input validation issue that could potentially
  lead to code execution (CVE-2009-2998).

  This update resolves an input validation issue that could potentially lead 
  to code execution (CVE-2009-3458).

  This update resolves a memory corruption issue that could potentially
  lead to code execution (CVE-2009-3460).
    
  This update resolves a Unix-only format bug when running in Debug mode
  that could lead to arbitrary code execution (CVE-2009-3462).
Comment 4 Vincent Danen 2009-10-13 20:38:09 EDT
According to the bulletin, the following CVEs only affect Acrobat, not Reader:

This update resolves an integer overflow that could potentially lead to code execution. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-2989).

This update resolves a memory corruption issue that could potentially lead to code execution. This issue is specific to Acrobat and does not affect Adobe Reader. (CVE-2009-3460).
Comment 5 Tomas Hoger 2009-10-14 03:30:43 EDT
CVE-2009-2564 is for a third-party component used by Windows installer:
  http://blogs.adobe.com/psirt/2009/07/local_privilege_escalation_in.html
Comment 7 errata-xmlrpc 2009-10-14 11:36:34 EDT
This issue has been addressed in following products:

  Extras for RHEL 3
  Extras for RHEL 4
  Extras for Red Hat Enterprise Linux 5

Via RHSA-2009:1499 https://rhn.redhat.com/errata/RHSA-2009-1499.html

Note You need to log in before you can comment on or make changes to this bug.