-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2013-0074 Title: Security Advisory for Adobe Reader and Acrobat [1] Version history: 10.10.2013 Initial publication Summary ================ Adobe has released security updates for Adobe Reader and Acrobat XI (11.0.04) for Windows. These updates address a regression that occurred in version 11.0.04 affecting Javascript security controls. Adobe Reader and Acrobat X (10.1.8) and earlier versions for Windows are not affected, and all versions of Adobe Reader and Acrobat for Macintosh are also not affected by this vulnerability. CVE number: CVE-2013-5325 Vulnerable systems ================ Adobe Reader XI (11.0.04) for Windows Adobe Acrobat XI (11.0.04) for Windows What can you do? ================ Adobe recommends users update their product installations to the latest versions: [1] Users of Adobe Reader XI (11.0.04) for Windows should update to Adobe Reader XI (11.0.05). Users of Adobe Acrobat XI (11.0.04) for Windows should update to Adobe Acrobat XI (11.0.05). If there is no patch for your version of the product, it may be necessary to upgrade to a higher version. What to tell your users? ================ Normal security best practices apply. Especially, inform your Web users to be cautious about files or links to sites that are provided by unfamiliar or suspicious sources. Users are to be aware not open suspicious files or to click on the link in suspicious emails; to immediately forward the suspicious email to the respective IT security officer / contact in your institution. More information ================ [1] http://www.adobe.com/support/security/bulletins/apsb13-25.html [2] http://web.nvd.nist.gov/ Best regards, CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 Privacy Statement: http://cert.europa.eu/cert/plainedition/en/cert_privacy.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iQIcBAEBAgAGBQJSVRsGAAoJEPpzpNLI8SVowZEP/02mdDeJ7KyPVMV3vhjR6vR8 gn5rOWw4Eci3osO0AiG95gHZT6iNnZamd37DWwlXDRSMteOYkO2Wpt1VcvXC0XWe 8oJR37lPNuSRvXmHqOsow3ymDIJSXopOsQe8pfWsb6S4ddgjYE+INkGvxfmWsyDy VURjiEhCTAvUubzAHrz9Am8JDvcQh/NevJ2JZ9frSN/m5BkUKnTIki4xbge8MjEa yiIPtTjBxHR7Y0J7LMz+ZYGmjxgS4hNuRHsHWT9VWO5J6QoZpfi1EWvQgOAcM7mj a2eDrkU+fN1fLm9G13x0osS1hpqZm1sEaUWElbYHQ2lZ2/SSFJHnOTTd11iPueya sjXR0HFccUpMrppTm8KaCSNZvRPjoNSx7Wlyt0ja6m/70zNk5HcoUhSnvj3hQZc7 y01NVyxLi1AHoPAwhqt3o+q2vx77BWrMRqD67oNF8E5z0hI6gUowdc++i0dCdxz+ YnncYFu/8t0sgG7RkaUvKKOl5lA9BJAdHHOPgRtBTju9sD6Ryv+NBOE/tjoXd06W wcDTJdpAvRWTTFn5qp1HzkKxdrDFZ8Ds7iDU/znjuhMA336fkkZQ0Z7iKivrQIks tdQBM4h9JXXvDPooKzfojNwWMbs4cJ5Fd/mxb/6v5wBZjF43cpA5ZkGgXbZguXmv 7WFQoLqMcQ4IyaeWlmZw =DXZ9 -----END PGP SIGNATURE-----