Thursday, September 15, 2011

Reader and Acrobat Updates Correct 13 Security Flaws

Adobe Graphic
 
 
Summary:

· This vulnerability affects: Adobe Reader and Acrobat X 10.1 and earlier, on Windows, Mac, as well as Reader 9.4.2 for  UNIX

· How an attacker exploits it: Typically, by enticing your users into viewing a maliciously crafted PDF document

· Impact: In the worst case, an attacker can execute code on your computer, potentially gaining control of it

· What to do: Install Adobe's Reader and Acrobat X 10.1.1 update as soon as possible (or let Adobe's Updater do it for you).

Exposure:

As part of their quarterly patch day cycle (which shares the same date as Microsoft Patch Day), Adobe released a security bulletin describing 13 security vulnerabilities (number based on CVE-IDs) that affect Adobe Reader and Acrobat X 10.1 and earlier, running on Windows and Mac, as well as Reader 9.4.2 for UNIX. The flaws differ technically, but consist primarily of buffer overflow and  memory corruption vulnerabilities, and share the same general scope and impact.

In the worst case, if an attacker can entice one of your users into downloading and opening a maliciously crafted PDF document (.pdf), he can exploit many of these vulnerabilities to execute code on that user's computer, with that user's privileges. If your user has local administrative privileges, the attacker gains full control of the user's machine. Keep in mind, Reader installs helpers in your browser to help it view PDF documents. Simply visiting a web site with a malicious embedded PDF document could trigger this type of attack.

Lately, attackers have leveraged Reader vulnerabilities in many of their email and web-based malware campaigns. We highly recommend you patch these Reader flaws as soon as possible.

Solution Path

Adobe has released Reader and Acrobat X 10.1.1 to fix these vulnerabilities. You should download and deploy the corresponding updates immediately, or let the Adobe Software Updater program do it for you. Adobe plans to release Reader 9.4.6 for UNIX on November 7, 2011. So you UNIX users will have to wait for their patch.

· Adobe Reader X 10.1.1

o For Windows

o For Mac

· Adobe Acrobat X

o Standard and Pro for Windows

o Pro Extended for Windows

o 3D for Windows

o Pro for Mac

For All WatchGuard Users:

Many WatchGuard Firebox models can block incoming PDF files. However, most administrators prefer to allow these file types for business purposes. Nonetheless, if PDF files are not absolutely necessary to your business, you may consider blocking them using the Firebox's proxies until the patch has been installed.

If you would like to use our proxies to block PDF documents, follow the links below for instructions:

· XTM Appliance with WSM 11.x

o How do I block files with the FTP proxy?

o How do I block files with the HTTP proxy?

o How do I block files with the POP3 proxy?

o How do I block files with the SMTP Proxy?

· Firebox X Edge running 10.x

o How do I block files with the FTP proxy?

o How do I block files with the HTTP proxy?

o How do I block files with the POP3 proxy?

o How do I block files with the SMTP proxy

· Firebox X Core and X Peak running Fireware 10.x

o How do I block files with the FTP proxy?

o How do I block files with the HTTP proxy?

o How do I block files with the POP3 proxy?

o How do I block files with the SMTP proxy?

Status:

Adobe has released patches that correct these vulnerabilities.

References:

· Adobe's September Reader Security Bulletin

Add a comment to this post