-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2012-0052 Title: Multiple vulnerabilities in Adobe Reader and Acrobat [1] Version history: 11.04.2012 Initial publication Summary ======= Adobe has released a patch for several vulnerabilities found in the Adobe Reader and Acrobat product. These vulnerabilities may lead to unauthorised access to the targeted system or cause a denial of service (memory corruption). The vendor has assessed these vulnerabilities as CRITICAL. CVE-2012-0774, CVE-2012-0775, CVE-2012-0776, CVE-2012-0777 CVSS v2 Base Score: 9.7 (CRITICAL) (AV:N/AC:L/Au:N/C:C/I:C/A:P)[6] Vulnerable systems ================== Adobe Reader X (10.1.2) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.5 and earlier 9.x versions for Windows and Macintosh Adobe Reader 9.4.6 and earlier 9.x versions for Linux Adobe Acrobat X (10.1.2) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.5 and earlier 9.x versions for Windows and Macintosh Original Details ================ CVE-2012-0774 Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to execute arbitrary code via a crafted TrueType font. CVE-2012-0775 The JavaScript implementation in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. CVE-2012-0776 The installer in Adobe Reader 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to bypass intended access restrictions and execute arbitrary code via unspecified vectors. CVE-2012-0777 The JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 on Mac OS X and Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors. What can you do? ================ Fix is available [1]. What to tell your users? ======================== Normal security best practices apply. Especially, inform your users to be cautious about following links to sites that are provided by unfamiliar or suspicious sources. Users are to be aware not to click on the link and attachments in suspicious emails; to immediately forward the suspicious email to the respective IT security officer / contact in your institution. More information ================ [1] http://www.adobe.com/support/security/bulletins/apsb12-08.html [2] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0774 [3] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0775 [4] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0776 [5] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0777 [6] Information about CVSS: http://www.first.org/cvss/cvss-guide.html Best regards, CERT-EU CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 (DISCLAIMER: CERT-EU, the CERT for the EU institutions, is currently in its setup phase, until May 2012. Services are provided in a pilot fashion, and are not yet fully functional. Announcements, alerts and warnings are sent out in best effort manner, and to contact information currently known to us. We apologise if you are not the correct recipient, or if you had already been warned about this issue from another source . Format, content and way of alerting are subject to change in the future. Contact information or even the team name may change as well.) -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iQIcBAEBAgAGBQJPhVCeAAoJEPpzpNLI8SVoTI4P/1uTQBAmadIi3fo2CzfzUua/ WnBmIGH4m0WjZDtEGJ/YVEGKGEDkYxXJA3Xx8KMxhOIbC1ekwiB7uEfSP406UdHN qPTcejJV4IEJHaqYj46+/urku0ELojDKDtArElCHpkIQBGCMKnbb4xqqhCnPIeLq YqjOxObzz1P9XhSytAm6ZCkp61gBgdW52kqfKUpQtwTpAKpKpUbv2jrg8BkhflBr ZPIvrnm7chfnjWaWti5nImJT/g5CvxrTaTNSiQdrKsMmTx/Pmo4aZvBpuE9tLcoq LcjyhqzfGIv4JcRA16RABvBSP7m7Yf5jzX1m/nNkLEWK//jJCpK2AUtf8kNwgUkZ 6/Y3z6NGisDcfKyf2sYIaQRRdJ4tMyW5fvOQuwxYqvZPcJlh7e/UpnZiAUDnfxpV 99WPc5V6qOcp2NT4LBeY89Cg2ajM03prfmbARejkT55y6ymB15VGIr/4CUVSiNFP IRI1ZUmSt++ztane/V6Bz9zbe2qh3og8RcH6F7vclwO5iCLd4S4ApTU3hhzHFhJT 5cfiqozp+D2Ah0MnRsc3btHfH0zn6qDSXNEF0TTxhUz7rwiQpUmdpDYLnhEb+X5K pbDX/F8UJLWUg//to/K6MlyR6vQjlWslRTDoulG6EgTNVIU3KEIHLeaTxyBgdfFX rS8cfLbCm9dmN3bCpxru =HG+p -----END PGP SIGNATURE-----