Adobe Security Bulletin for Adobe Reader and Acrobat APSB10-02 fixes following code execution flaws: This update resolves a use-after-free vulnerability in Multimedia.api that could lead to code execution (CVE-2009-4324). -> tracked via separate bug #547799 This update resolves an array boundary issue in U3D support that could lead to code execution (CVE-2009-3953). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2009-3955). This update resolves an integer overflow vulnerability in U3D support that could lead to code execution (CVE-2009-3959).
Two more platform-specific issues: This update resolves a DLL-loading vulnerability in 3D that could allow arbitrary code execution (CVE-2009-3954). This update resolves a buffer overflow vulnerability in the Download Manager that could lead to code execution (CVE-2009-3958).
(In reply to comment #1) > This update resolves a DLL-loading vulnerability in 3D that could allow > arbitrary code execution (CVE-2009-3954). Adobe confirmed this affects 8.x for Unix too.
Public now via: http://www.adobe.com/support/security/bulletins/apsb10-02.html
This issue has been addressed in following products: Extras for Red Hat Enterprise Linux 5 Via RHSA-2010:0037 https://rhn.redhat.com/errata/RHSA-2010-0037.html
This issue has been addressed in following products: Extras for RHEL 4 Via RHSA-2010:0038 https://rhn.redhat.com/errata/RHSA-2010-0038.html
This issue has been addressed in following products: Extras for RHEL 3 Via RHSA-2010:0060 https://rhn.redhat.com/errata/RHSA-2010-0060.html