Common Vulnerabilities and Exposures assigned an identifier CVE-2010-4091 to the following vulnerability: Name: CVE-2010-4091 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4091 Assigned: 20101025 Reference: EXPLOIT-DB:15419 Reference: URL: http://www.exploit-db.com/exploits/15419 Reference: FULLDISC:20101103 [0dayz] Acrobat Reader Memory Corruption Remote Arbitrary Code Execution Reference: URL: http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0024.html Reference: MISC: http://blogs.adobe.com/psirt/2010/11/potential-issue-in-adobe-reader.html Reference: BID:44638 Reference: URL: http://www.securityfocus.com/bid/44638 Reference: SECUNIA:42095 Reference: URL: http://secunia.com/advisories/42095 Reference: VUPEN:ADV-2010-2890 Reference: URL: http://www.vupen.com/english/advisories/2010/2890 Reference: XF:adobe-reader-pdf-file-ce(62996) Reference: URL: http://xforce.iss.net/xforce/xfdb/62996 The EScript.api plugin in Adobe Acrobat Reader 9.4.0, 8.1.7, and probably other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF document that triggers memory corruption, involving the printSeps function. NOTE: some of these details are obtained from third party information. Note: the linked Adobe blog posting provides some mitigation steps by utilizing the JavaScript Blacklist Framework, the steps for which are reproduced below: 1. Go to the Global Prefs file at: /Reader/GlobalPrefs/reader_prefs 2. Add the following line to the file: /JavaScriptPerms [/c << /BlackList [/t (Doc.printSeps) ] >> ]
This issue has been addressed in following products: Extras for RHEL 4 Extras for Red Hat Enterprise Linux 5 Extras for Red Hat Enterprise Linux 6 Via RHSA-2010:0934 https://rhn.redhat.com/errata/RHSA-2010-0934.html