=====================================================================
                                   CERT-Renater

                        Note d'Information No. 2010/VULN460
_____________________________________________________________________

DATE                      : 17/11/2010

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running Adobe Reader versions prior to 9.4.1,
                               Adobe Acrobat versions prior to 9.4.1.

======================================================================
http://www.adobe.com/support/security/bulletins/apsb10-28.html
______________________________________________________________________

Security updates available for Adobe Reader and Acrobat

Release date: November 16, 2010

Vulnerability identifier: APSB10-28

CVE numbers: CVE-2010-3654, CVE-2010-4091

Platform: All Platforms

Summary

Critical vulnerabilities have been identified in Adobe Reader 9.4 (and earlier
versions) for Windows, Macintosh and UNIX, and Adobe Acrobat 9.4 (and earlier
9.x versions) for Windows and Macintosh. These vulnerabilities could cause the
application to crash and potentially allow an attacker to take control of the
affected system.

In addition to addressing CVE-2010-3654 noted in Security Advisory APSA10-05
and CVE-2010-4091 referenced in the Adobe PSIRT blog ("Potential issue in
Adobe Reader"), these updates also incorporate the Adobe Flash Player update
as noted in Security Bulletin APSB10-26.

Adobe recommends users of Adobe Reader 9.4 and earlier versions for Windows
and Macintosh update to Adobe Reader 9.4.1, available now. Adobe recommends
users of Adobe Reader 9.4 and earlier versions for UNIX update to Adobe
Reader 9.4.1, expected to be available on November 30, 2010. Adobe recommends
users of Adobe Acrobat 9.4 and earlier 9.x versions for Windows and Macintosh
update to Adobe Acrobat 9.4.1.

Note that these updates represent an out-of-cycle release. The next quarterly
security updates for Adobe Reader and Acrobat are scheduled for February 8,
2011.

Affected software versions

    * Adobe Reader 9.4 and earlier versions for Windows, Macintosh and UNIX
    * Adobe Acrobat 9.4 and earlier 9.x versions for Windows and Macintosh

Solution

Adobe recommends users update their software installations by following the
instructions below:

Adobe Reader

Users on Windows and Macintosh can utilize the product's update mechanism. The
default configuration is set to run automatic update checks on a regular
schedule. Update checks can be manually activated by choosing Help > Check for
Updates.

Adobe Reader users on Windows can also find the appropriate update here:
http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows

Adobe Reader users on Macintosh can also find the appropriate update here:
http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Macintosh

An update for Adobe Reader users on UNIX is expected to be available on
November 30, 2010.

Adobe Acrobat

Users can utilize the product's update mechanism. The default configuration is
set to run automatic update checks on a regular schedule. Update checks can be
manually activated by choosing Help > Check for Updates.

Acrobat Standard and Pro users on Windows can also find the appropriate update
here:
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows

Acrobat Pro Extended users on Windows can also find the appropriate update
here:
http://www.adobe.com/support/downloads/product.jsp?product=158&platform=Windows

Acrobat 3D users on Windows can also find the appropriate update here:
http://www.adobe.com/support/downloads/product.jsp?product=112&platform=Windows

Acrobat Pro users on Macintosh can also find the appropriate update here:
http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Macintosh
Severity rating

Adobe categorizes these as critical updates and recommends that users apply the
latest updates for their product installations.
Details

Critical vulnerabilities have been identified in Adobe Reader 9.4 (and earlier
versions) for Windows, Macintosh and UNIX, and Adobe Acrobat 9.4 (and earlier
9.x versions) for Windows and Macintosh. These vulnerabilities could cause the
application to crash and potentially allow an attacker to take control of the
affected system.

In addition to addressing CVE-2010-3654 noted in Security Advisory APSA10-05
and CVE-2010-4091 referenced in the Adobe PSIRT blog ("Potential issue in
Adobe Reader"), these updates also incorporate the Adobe Flash Player update
as noted in Security Bulletin APSB10-26.

Adobe recommends users of Adobe Reader 9.4 and earlier versions for Windows
and Macintosh update to Adobe Reader 9.4.1, available now. Adobe recommends
users of Adobe Reader 9.4 and earlier versions for UNIX update to Adobe Reader
9.4.1, expected to be available on November 30, 2010. Adobe recommends users
of Adobe Acrobat 9.4 and earlier 9.x versions for Windows and Macintosh update
to Adobe Acrobat 9.4.1.

These issues do not affect Adobe Reader for Android.

These updates resolve a memory corruption vulnerability that could lead to
code execution (CVE-2010-3654).
*Note: This issue does not affect Adobe Reader version 8.x or Adobe Acrobat
version 8.x.

These updates resolve a memory corruption vulnerability that could potentially
lead to code execution (Adobe Reader only) (CVE-2010-4091).
*Note: This issue does not affect any version of Adobe Acrobat. Adobe plans
to address Adobe Reader version 8.x in the next release.

These updates also incorporate the Adobe Flash Player update as noted in
Security Bulletin APSB10-26.

======================================================================

          =========================================================
          Les serveurs de référence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 23 - 25 Rue Daviel    | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================


