Tomorrow, on Tuesday 2010-04-13, Adobe is planning to release an update for Adobe Reader 9.3.1 and earlier versions, to address multiple security issues allowing code execution, whose description is detailed in the Adobe Security Bulletin APSB10-09: [1] http://www.adobe.com/support/security/bulletins/apsb10-09.html This update resolves a cross-site scripting vulnerability that could lead to code execution (CVE-2010-0190). This update resolves a prefix protocol handler vulnerability that could lead to code execution (CVE-2010-0191). This update resolves a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible (CVE-2010-0192). This update resolves a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible (CVE-2010-0193). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-0194). This update resolves a font handling vulnerability that could lead to code execution (CVE-2010-0195). This update resolves a denial of service vulnerability; arbitrary code execution has not been demonstrated, but may be possible (CVE-2010-0196). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-0197). This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2010-0198). This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2010-0199). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-0201). This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2010-0202). This update resolves a buffer overflow vulnerability that could lead to code execution (CVE-2010-0203). This update resolves a memory corruption vulnerability that could lead to code execution (CVE-2010-0204).
This issue is now public.
This issue has been addressed in following products: Extras for RHEL 4 Extras for Red Hat Enterprise Linux 5 Via RHSA-2010:0349 https://rhn.redhat.com/errata/RHSA-2010-0349.html