Date: 15 November 2011
References: ESB-2011.0938.2
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2011.1152
Security update for Acrobat Reader
15 November 2011
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: Acrobat Reader
Publisher: SUSE
Operating System: SUSE
Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction
Increased Privileges -- Remote with User Interaction
Resolution: Patch/Upgrade
CVE Names: CVE-2011-2442 CVE-2011-2441 CVE-2011-2440
CVE-2011-2439 CVE-2011-2438 CVE-2011-2437
CVE-2011-2436 CVE-2011-2435 CVE-2011-2434
CVE-2011-2433 CVE-2011-2432 CVE-2011-2431
CVE-2011-1353
Reference: ESB-2011.0938
- --------------------------BEGIN INCLUDED TEXT--------------------
SUSE Security Update: Security update for Acrobat Reader
______________________________________________________________________________
Announcement ID: SUSE-SU-2011:1239-1
Rating: critical
References: #717724
Cross-References: CVE-2011-1353 CVE-2011-2431 CVE-2011-2432
CVE-2011-2433 CVE-2011-2434 CVE-2011-2435
CVE-2011-2436 CVE-2011-2437 CVE-2011-2438
CVE-2011-2439 CVE-2011-2440 CVE-2011-2441
CVE-2011-2442
Affected Products:
SUSE Linux Enterprise Desktop 11 SP1
SUSE Linux Enterprise Desktop 10 SP4
______________________________________________________________________________
An update that fixes 13 vulnerabilities is now available.
It includes one version update.
Description:
Acrobat reader was updated to version 9.4.6 to fix several
security issues (CVE-2011-1353, CVE-2011-2431,
CVE-2011-2432, CVE-2011-2433, CVE-2011-2434,
CVE-2011-2435, CVE-2011-2436, CVE-2011-2437, CVE-2011-2438,
CVE-2011-2439, CVE-2011-2440, CVE-2011-2441, CVE-2011-2442)
Security Issue references:
* CVE-2011-1353
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1353
>
* CVE-2011-2431
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2431
>
* CVE-2011-2432
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2432
>
* CVE-2011-2433
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2433
>
* CVE-2011-2434
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2434
>
* CVE-2011-2435
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2435
>
* CVE-2011-2436
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2436
>
* CVE-2011-2437
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2437
>
* CVE-2011-2438
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2438
>
* CVE-2011-2439
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2439
>
* CVE-2011-2440
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2440
>
* CVE-2011-2441
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2441
>
* CVE-2011-2442
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2442
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Desktop 11 SP1:
zypper in -t patch sledsp1-acroread-5412
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Desktop 11 SP1 (noarch) [New Version: 9.4.6]:
acroread-cmaps-9.4.6-0.2.1
acroread-fonts-ja-9.4.6-0.2.1
acroread-fonts-ko-9.4.6-0.2.1
acroread-fonts-zh_CN-9.4.6-0.2.1
acroread-fonts-zh_TW-9.4.6-0.2.1
- SUSE Linux Enterprise Desktop 11 SP1 (i586) [New Version: 9.4.6]:
acroread-9.4.6-0.2.1
- SUSE Linux Enterprise Desktop 10 SP4 (noarch) [New Version: 9.4.6]:
acroread-cmaps-9.4.6-0.5.1
acroread-fonts-ja-9.4.6-0.5.1
acroread-fonts-ko-9.4.6-0.5.1
acroread-fonts-zh_CN-9.4.6-0.5.1
acroread-fonts-zh_TW-9.4.6-0.5.1
- SUSE Linux Enterprise Desktop 10 SP4 (i586) [New Version: 9.4.6]:
acroread-9.4.6-0.5.1
References:
http://support.novell.com/security/cve/CVE-2011-1353.html
http://support.novell.com/security/cve/CVE-2011-2431.html
http://support.novell.com/security/cve/CVE-2011-2432.html
http://support.novell.com/security/cve/CVE-2011-2433.html
http://support.novell.com/security/cve/CVE-2011-2434.html
http://support.novell.com/security/cve/CVE-2011-2435.html
http://support.novell.com/security/cve/CVE-2011-2436.html
http://support.novell.com/security/cve/CVE-2011-2437.html
http://support.novell.com/security/cve/CVE-2011-2438.html
http://support.novell.com/security/cve/CVE-2011-2439.html
http://support.novell.com/security/cve/CVE-2011-2440.html
http://support.novell.com/security/cve/CVE-2011-2441.html
http://support.novell.com/security/cve/CVE-2011-2442.html
https://bugzilla.novell.com/717724
http://download.novell.com/patch/finder/?keywords=04e3cd5de8e24c9c3136e18902d86d2d
http://download.novell.com/patch/finder/?keywords=729306cbb9eef9773fe9541056dca550
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=3LF8
-----END PGP SIGNATURE-----
|