RHEL 5 : acroread (RHSA-2010:0037)

critical Nessus Plugin ID 63911

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated acroread packages that fix multiple security issues and three bugs are now available for Red Hat Enterprise Linux 5 Supplementary.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

Adobe Reader allows users to view and print documents in Portable Document Format (PDF).

This update fixes several vulnerabilities in Adobe Reader. These vulnerabilities are summarized on the Adobe Security Advisory APSB10-02 page listed in the References section. A specially crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened.
(CVE-2009-4324, CVE-2009-3953, CVE-2009-3954, CVE-2009-3955, CVE-2009-3959, CVE-2009-3956)

This update also fixes the following bugs :

* the acroread process continued to run even after closing a PDF file.
If multiple PDF files were opened and then closed, the acroread processes continued to run and consume system resources (up to 100% CPU usage). With this update, the acroread process correctly exits, which resolves this issue. (BZ#473217)

* the PPKLite.api plug-in was missing, causing Adobe Reader to crash when attempting to open signed PDF files. For such files, if an immediate crash was not observed, clicking on the Signature Panel could trigger one. With this update, the PPKLite.api plug-in is included, which resolves this issue. (BZ#472975)

* Adobe Reader has been upgraded to version 9.3. (BZ#497957)

Adobe have discontinued support for Adobe Reader 8 for Linux. All users of Adobe Reader are advised to install these updated packages, which contain Adobe Reader version 9.3, which is not vulnerable to these issues and fixes these bugs. All running instances of Adobe Reader must be restarted for the update to take effect.

Solution

Update the affected acroread and / or acroread-plugin packages.

See Also

https://access.redhat.com/security/cve/cve-2009-3953

https://access.redhat.com/security/cve/cve-2009-3954

https://access.redhat.com/security/cve/cve-2009-3955

https://access.redhat.com/security/cve/cve-2009-3956

https://access.redhat.com/security/cve/cve-2009-3959

https://access.redhat.com/security/cve/cve-2009-4324

https://www.adobe.com/support/security/bulletins/apsb10-02.html

https://access.redhat.com/errata/RHSA-2010:0037

Plugin Details

Severity: Critical

ID: 63911

File Name: redhat-RHSA-2010-0037.nasl

Version: 1.23

Type: local

Agent: unix

Published: 1/24/2013

Updated: 6/8/2022

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2009-3959

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:acroread, p-cpe:/a:redhat:enterprise_linux:acroread-plugin, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/13/2010

Vulnerability Publication Date: 12/14/2009

CISA Known Exploited Vulnerability Due Dates: 6/22/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Adobe Doc.media.newPlayer Use After Free Vulnerability)

Reference Information

CVE: CVE-2009-3953, CVE-2009-3954, CVE-2009-3955, CVE-2009-3956, CVE-2009-3959, CVE-2009-4324

BID: 37331, 37756, 37757, 37758, 37761, 37763

CWE: 119, 16, 189, 399, 94

RHSA: 2010:0037