Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-5666 (GCVE-0-2007-5666)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:39:13.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA08-043A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html" }, { "name": "ADV-2008-1966", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1966/references" }, { "name": "oval:org.mitre.oval:def:11161", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html" }, { "name": "239286", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1" }, { "name": "GLSA-200803-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml" }, { "name": "29065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29065" }, { "name": "30840", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30840" }, { "name": "29205", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29205" }, { "name": "20080208 Adobe Reader Security Provider Unsafe Libary Path Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655" }, { "name": "RHSA-2008:0144", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA08-043A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html" }, { "name": "ADV-2008-1966", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1966/references" }, { "name": "oval:org.mitre.oval:def:11161", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html" }, { "name": "239286", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1" }, { "name": "GLSA-200803-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml" }, { "name": "29065", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29065" }, { "name": "30840", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30840" }, { "name": "29205", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29205" }, { "name": "20080208 Adobe Reader Security Provider Unsafe Libary Path Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655" }, { "name": "RHSA-2008:0144", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5666", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA08-043A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb08-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html" }, { "name": "ADV-2008-1966", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1966/references" }, { "name": "oval:org.mitre.oval:def:11161", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161" }, { "name": "http://www.adobe.com/support/security/advisories/apsa08-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html" }, { "name": "239286", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1" }, { "name": "GLSA-200803-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml" }, { "name": "29065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29065" }, { "name": "30840", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30840" }, { "name": "29205", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29205" }, { "name": "20080208 Adobe Reader Security Provider Unsafe Libary Path Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655" }, { "name": "RHSA-2008:0144", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5666", "datePublished": "2008-02-12T18:00:00", "dateReserved": "2007-10-23T00:00:00", "dateUpdated": "2024-08-07T15:39:13.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-5666\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-02-12T19:00:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ruta de b\u00fasqueda no confiable en Adobe Reader y Acrobat 8.1.1 y anteriores permite a usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una librer\u00eda maliciosa del proveedor de Seguridad en el directorio de trabajo actual de los lectores. NOTA: este asunto podr\u00eda estar subsumido por CVE-2008-0655.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:C/I:C/A:C\",\"baseScore\":6.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":1.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.1.1\",\"matchCriteriaId\":\"3A068220-ADFE-46F0-AE35-3355BEFEECD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.1.1\",\"matchCriteriaId\":\"82321E60-2553-41E2-A4F4-375CFF011C0A\"}]}]}],\"references\":[{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29065\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29205\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30840\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200803-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa08-01.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb08-13.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0144.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-043A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1966/references\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/29065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29205\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/30840\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200803-01.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.adobe.com/support/security/advisories/apsa08-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.adobe.com/support/security/bulletins/apsb08-13.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0144.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-043A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/1966/references\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2008_0144
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated acroread packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Adobe Reader allows users to view and print documents in portable\ndocument format (PDF).\n\nSeveral flaws were found in the way Adobe Reader processed malformed PDF\nfiles. An attacker could create a malicious PDF file which could execute\narbitrary code if opened by a victim. (CVE-2007-5659, CVE-2007-5663,\nCVE-2007-5666, CVE-2008-0726)\n\nA flaw was found in the way the Adobe Reader browser plug-in honored\ncertain requests. A malicious PDF file could cause the browser to request\nan unauthorized URL, allowing for a cross-site request forgery attack.\n(CVE-2007-0044)\n\nA flaw was found in Adobe Reader\u0027s JavaScript API DOC.print function. A\nmalicious PDF file could silently trigger non-interactive printing of the\ndocument, causing multiple copies to be printed without the users consent.\n(CVE-2008-0667)\n\nAdditionally, this update fixes multiple unknown flaws in Adobe Reader.\nWhen the information regarding these flaws is made public by Adobe, it will\nbe added to this advisory. (CVE-2008-0655)\n\nNote: Adobe have yet to release security fixed versions of Adobe 7. All\nusers of Adobe Reader are, therefore, advised to install these updated\npackages. They contain Adobe Reader version 8.1.2, which is not vulnerable\nto these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0144", "url": "https://access.redhat.com/errata/RHSA-2008:0144" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "223113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223113" }, { "category": "external", "summary": "431985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431985" }, { "category": "external", "summary": "432471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432471" }, { "category": "external", "summary": "432629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432629" }, { "category": "external", "summary": "432630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432630" }, { "category": "external", "summary": "432632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432632" }, { "category": "external", "summary": "432757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432757" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0144.json" } ], "title": "Red Hat Security Advisory: acroread security update", "tracking": { "current_release_date": "2024-11-14T10:05:41+00:00", "generator": { "date": "2024-11-14T10:05:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2008:0144", "initial_release_date": "2008-02-22T16:57:00+00:00", "revision_history": [ { "date": "2008-02-22T16:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-02-22T11:57:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:05:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3 Extras", "product": { "name": "Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "acroread-0:8.1.2-1.el4.2.i386", "product": { "name": "acroread-0:8.1.2-1.el4.2.i386", "product_id": "acroread-0:8.1.2-1.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@8.1.2-1.el4.2?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:8.1.2-1.el4.2.i386", "product": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386", "product_id": "acroread-plugin-0:8.1.2-1.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@8.1.2-1.el4.2?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:8.1.2-1.el3.6.i386", "product": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386", "product_id": "acroread-plugin-0:8.1.2-1.el3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@8.1.2-1.el3.6?arch=i386" } } }, { "category": "product_version", "name": "acroread-0:8.1.2-1.el3.6.i386", "product": { "name": "acroread-0:8.1.2-1.el3.6.i386", "product_id": "acroread-0:8.1.2-1.el3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@8.1.2-1.el3.6?arch=i386" } } }, { "category": "product_version", "name": "acroread-0:8.1.2-1.el5.3.i386", "product": { "name": "acroread-0:8.1.2-1.el5.3.i386", "product_id": "acroread-0:8.1.2-1.el5.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@8.1.2-1.el5.3?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:8.1.2-1.el5.3.i386", "product": { "name": "acroread-plugin-0:8.1.2-1.el5.3.i386", "product_id": "acroread-plugin-0:8.1.2-1.el5.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@8.1.2-1.el5.3?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-0044", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2007-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "223113" } ], "notes": [ { "category": "description", "text": "Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka \"Universal CSRF and session riding.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "Acrobat Reader Universal CSRF and session riding", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-0044" }, { "category": "external", "summary": "RHBZ#223113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-0044", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0044" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0044", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0044" } ], "release_date": "2007-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Acrobat Reader Universal CSRF and session riding" }, { "cve": "CVE-2007-5659", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432629" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread Multiple buffer overflows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5659" }, { "category": "external", "summary": "RHBZ#432629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432629" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5659", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "acroread Multiple buffer overflows" }, { "cve": "CVE-2007-5663", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432630" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread JavaScript Insecure Method Exposure", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5663" }, { "category": "external", "summary": "RHBZ#432630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432630" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5663", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5663" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5663", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5663" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread JavaScript Insecure Method Exposure" }, { "cve": "CVE-2007-5666", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432632" } ], "notes": [ { "category": "description", "text": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread JavaScript Insecure Libary Search Path", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5666" }, { "category": "external", "summary": "RHBZ#432632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432632" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5666", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5666" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread JavaScript Insecure Libary Search Path" }, { "cve": "CVE-2008-0655", "discovery_date": "2008-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "431985" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: unspecified vulnerabilities", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0655" }, { "category": "external", "summary": "RHBZ#431985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431985" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0655", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0655" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2008-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "acroread: unspecified vulnerabilities" }, { "cve": "CVE-2008-0667", "discovery_date": "2008-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432471" } ], "notes": [ { "category": "description", "text": "The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote attackers to configure silent non-interactive printing, and trigger the printing of an arbitrary number of copies of a document. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: silent print vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0667" }, { "category": "external", "summary": "RHBZ#432471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0667", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0667" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0667", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0667" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "acroread: silent print vulnerability" }, { "cve": "CVE-2008-0726", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432757" } ], "notes": [ { "category": "description", "text": "Integer overflow in Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via crafted arguments to the printSepsWithParams, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "Acroread memory corruption", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0726" }, { "category": "external", "summary": "RHBZ#432757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0726", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0726" } ], "release_date": "2008-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Acroread memory corruption" } ] }
RHSA-2008:0144
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated acroread packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Adobe Reader allows users to view and print documents in portable\ndocument format (PDF).\n\nSeveral flaws were found in the way Adobe Reader processed malformed PDF\nfiles. An attacker could create a malicious PDF file which could execute\narbitrary code if opened by a victim. (CVE-2007-5659, CVE-2007-5663,\nCVE-2007-5666, CVE-2008-0726)\n\nA flaw was found in the way the Adobe Reader browser plug-in honored\ncertain requests. A malicious PDF file could cause the browser to request\nan unauthorized URL, allowing for a cross-site request forgery attack.\n(CVE-2007-0044)\n\nA flaw was found in Adobe Reader\u0027s JavaScript API DOC.print function. A\nmalicious PDF file could silently trigger non-interactive printing of the\ndocument, causing multiple copies to be printed without the users consent.\n(CVE-2008-0667)\n\nAdditionally, this update fixes multiple unknown flaws in Adobe Reader.\nWhen the information regarding these flaws is made public by Adobe, it will\nbe added to this advisory. (CVE-2008-0655)\n\nNote: Adobe have yet to release security fixed versions of Adobe 7. All\nusers of Adobe Reader are, therefore, advised to install these updated\npackages. They contain Adobe Reader version 8.1.2, which is not vulnerable\nto these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0144", "url": "https://access.redhat.com/errata/RHSA-2008:0144" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "223113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223113" }, { "category": "external", "summary": "431985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431985" }, { "category": "external", "summary": "432471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432471" }, { "category": "external", "summary": "432629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432629" }, { "category": "external", "summary": "432630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432630" }, { "category": "external", "summary": "432632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432632" }, { "category": "external", "summary": "432757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432757" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0144.json" } ], "title": "Red Hat Security Advisory: acroread security update", "tracking": { "current_release_date": "2025-09-26T03:07:00+00:00", "generator": { "date": "2025-09-26T03:07:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2008:0144", "initial_release_date": "2008-02-22T16:57:00+00:00", "revision_history": [ { "date": "2008-02-22T16:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-02-22T11:57:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:07:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3 Extras", "product": { "name": "Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "acroread-0:8.1.2-1.el4.2.i386", "product": { "name": "acroread-0:8.1.2-1.el4.2.i386", "product_id": "acroread-0:8.1.2-1.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@8.1.2-1.el4.2?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:8.1.2-1.el4.2.i386", "product": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386", "product_id": "acroread-plugin-0:8.1.2-1.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@8.1.2-1.el4.2?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:8.1.2-1.el3.6.i386", "product": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386", "product_id": "acroread-plugin-0:8.1.2-1.el3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@8.1.2-1.el3.6?arch=i386" } } }, { "category": "product_version", "name": "acroread-0:8.1.2-1.el3.6.i386", "product": { "name": "acroread-0:8.1.2-1.el3.6.i386", "product_id": "acroread-0:8.1.2-1.el3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@8.1.2-1.el3.6?arch=i386" } } }, { "category": "product_version", "name": "acroread-0:8.1.2-1.el5.3.i386", "product": { "name": "acroread-0:8.1.2-1.el5.3.i386", "product_id": "acroread-0:8.1.2-1.el5.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@8.1.2-1.el5.3?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:8.1.2-1.el5.3.i386", "product": { "name": "acroread-plugin-0:8.1.2-1.el5.3.i386", "product_id": "acroread-plugin-0:8.1.2-1.el5.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@8.1.2-1.el5.3?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-0044", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2007-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "223113" } ], "notes": [ { "category": "description", "text": "Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka \"Universal CSRF and session riding.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "Acrobat Reader Universal CSRF and session riding", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-0044" }, { "category": "external", "summary": "RHBZ#223113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-0044", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0044" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0044", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0044" } ], "release_date": "2007-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Acrobat Reader Universal CSRF and session riding" }, { "cve": "CVE-2007-5659", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432629" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread Multiple buffer overflows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5659" }, { "category": "external", "summary": "RHBZ#432629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432629" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5659", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "acroread Multiple buffer overflows" }, { "cve": "CVE-2007-5663", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432630" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread JavaScript Insecure Method Exposure", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5663" }, { "category": "external", "summary": "RHBZ#432630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432630" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5663", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5663" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5663", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5663" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread JavaScript Insecure Method Exposure" }, { "cve": "CVE-2007-5666", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432632" } ], "notes": [ { "category": "description", "text": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread JavaScript Insecure Libary Search Path", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5666" }, { "category": "external", "summary": "RHBZ#432632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432632" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5666", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5666" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread JavaScript Insecure Libary Search Path" }, { "cve": "CVE-2008-0655", "discovery_date": "2008-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "431985" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: unspecified vulnerabilities", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0655" }, { "category": "external", "summary": "RHBZ#431985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431985" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0655", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0655" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2008-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "acroread: unspecified vulnerabilities" }, { "cve": "CVE-2008-0667", "discovery_date": "2008-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432471" } ], "notes": [ { "category": "description", "text": "The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote attackers to configure silent non-interactive printing, and trigger the printing of an arbitrary number of copies of a document. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: silent print vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0667" }, { "category": "external", "summary": "RHBZ#432471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0667", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0667" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0667", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0667" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "acroread: silent print vulnerability" }, { "cve": "CVE-2008-0726", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432757" } ], "notes": [ { "category": "description", "text": "Integer overflow in Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via crafted arguments to the printSepsWithParams, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "Acroread memory corruption", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0726" }, { "category": "external", "summary": "RHBZ#432757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0726", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0726" } ], "release_date": "2008-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Acroread memory corruption" } ] }
rhsa-2008:0144
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated acroread packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 3, 4, and 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Adobe Reader allows users to view and print documents in portable\ndocument format (PDF).\n\nSeveral flaws were found in the way Adobe Reader processed malformed PDF\nfiles. An attacker could create a malicious PDF file which could execute\narbitrary code if opened by a victim. (CVE-2007-5659, CVE-2007-5663,\nCVE-2007-5666, CVE-2008-0726)\n\nA flaw was found in the way the Adobe Reader browser plug-in honored\ncertain requests. A malicious PDF file could cause the browser to request\nan unauthorized URL, allowing for a cross-site request forgery attack.\n(CVE-2007-0044)\n\nA flaw was found in Adobe Reader\u0027s JavaScript API DOC.print function. A\nmalicious PDF file could silently trigger non-interactive printing of the\ndocument, causing multiple copies to be printed without the users consent.\n(CVE-2008-0667)\n\nAdditionally, this update fixes multiple unknown flaws in Adobe Reader.\nWhen the information regarding these flaws is made public by Adobe, it will\nbe added to this advisory. (CVE-2008-0655)\n\nNote: Adobe have yet to release security fixed versions of Adobe 7. All\nusers of Adobe Reader are, therefore, advised to install these updated\npackages. They contain Adobe Reader version 8.1.2, which is not vulnerable\nto these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0144", "url": "https://access.redhat.com/errata/RHSA-2008:0144" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#critical", "url": "http://www.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "223113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223113" }, { "category": "external", "summary": "431985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431985" }, { "category": "external", "summary": "432471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432471" }, { "category": "external", "summary": "432629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432629" }, { "category": "external", "summary": "432630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432630" }, { "category": "external", "summary": "432632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432632" }, { "category": "external", "summary": "432757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432757" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0144.json" } ], "title": "Red Hat Security Advisory: acroread security update", "tracking": { "current_release_date": "2025-09-26T03:07:00+00:00", "generator": { "date": "2025-09-26T03:07:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.8" } }, "id": "RHSA-2008:0144", "initial_release_date": "2008-02-22T16:57:00+00:00", "revision_history": [ { "date": "2008-02-22T16:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-02-22T11:57:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-26T03:07:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3 Extras", "product": { "name": "Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "acroread-0:8.1.2-1.el4.2.i386", "product": { "name": "acroread-0:8.1.2-1.el4.2.i386", "product_id": "acroread-0:8.1.2-1.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@8.1.2-1.el4.2?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:8.1.2-1.el4.2.i386", "product": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386", "product_id": "acroread-plugin-0:8.1.2-1.el4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@8.1.2-1.el4.2?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:8.1.2-1.el3.6.i386", "product": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386", "product_id": "acroread-plugin-0:8.1.2-1.el3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@8.1.2-1.el3.6?arch=i386" } } }, { "category": "product_version", "name": "acroread-0:8.1.2-1.el3.6.i386", "product": { "name": "acroread-0:8.1.2-1.el3.6.i386", "product_id": "acroread-0:8.1.2-1.el3.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@8.1.2-1.el3.6?arch=i386" } } }, { "category": "product_version", "name": "acroread-0:8.1.2-1.el5.3.i386", "product": { "name": "acroread-0:8.1.2-1.el5.3.i386", "product_id": "acroread-0:8.1.2-1.el5.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread@8.1.2-1.el5.3?arch=i386" } } }, { "category": "product_version", "name": "acroread-plugin-0:8.1.2-1.el5.3.i386", "product": { "name": "acroread-plugin-0:8.1.2-1.el5.3.i386", "product_id": "acroread-plugin-0:8.1.2-1.el5.3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/acroread-plugin@8.1.2-1.el5.3?arch=i386" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el3.6.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el3.6.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el4.2.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el4.2.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "acroread-plugin-0:8.1.2-1.el5.3.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" }, "product_reference": "acroread-plugin-0:8.1.2-1.el5.3.i386", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-0044", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2007-01-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "223113" } ], "notes": [ { "category": "description", "text": "Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attackers to force the browser to make unauthorized requests to other web sites via a URL in the (1) FDF, (2) xml, and (3) xfdf AJAX request parameters, following the # (hash) character, aka \"Universal CSRF and session riding.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "Acrobat Reader Universal CSRF and session riding", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-0044" }, { "category": "external", "summary": "RHBZ#223113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=223113" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-0044", "url": "https://www.cve.org/CVERecord?id=CVE-2007-0044" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0044", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0044" } ], "release_date": "2007-01-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Acrobat Reader Universal CSRF and session riding" }, { "cve": "CVE-2007-5659", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432629" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Adobe Reader and Acrobat 8.1.1 and earlier allow remote attackers to execute arbitrary code via a PDF file with long arguments to unspecified JavaScript methods. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread Multiple buffer overflows", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5659" }, { "category": "external", "summary": "RHBZ#432629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432629" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5659", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5659" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "acroread Multiple buffer overflows" }, { "cve": "CVE-2007-5663", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432630" } ], "notes": [ { "category": "description", "text": "Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that calls an insecure JavaScript method in the EScript.api plug-in. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread JavaScript Insecure Method Exposure", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5663" }, { "category": "external", "summary": "RHBZ#432630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432630" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5663", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5663" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5663", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5663" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread JavaScript Insecure Method Exposure" }, { "cve": "CVE-2007-5666", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432632" } ], "notes": [ { "category": "description", "text": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread JavaScript Insecure Libary Search Path", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5666" }, { "category": "external", "summary": "RHBZ#432632", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432632" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5666", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5666" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "acroread JavaScript Insecure Libary Search Path" }, { "cve": "CVE-2008-0655", "discovery_date": "2008-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "431985" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Adobe Reader and Acrobat before 8.1.2 have unknown impact and attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: unspecified vulnerabilities", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0655" }, { "category": "external", "summary": "RHBZ#431985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431985" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0655", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0655" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0655" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2008-02-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "exploit_status", "date": "2022-06-08T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Critical" } ], "title": "acroread: unspecified vulnerabilities" }, { "cve": "CVE-2008-0667", "discovery_date": "2008-02-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432471" } ], "notes": [ { "category": "description", "text": "The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote attackers to configure silent non-interactive printing, and trigger the printing of an arbitrary number of copies of a document. NOTE: this issue might be subsumed by CVE-2008-0655.", "title": "Vulnerability description" }, { "category": "summary", "text": "acroread: silent print vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0667" }, { "category": "external", "summary": "RHBZ#432471", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432471" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0667", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0667" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0667", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0667" } ], "release_date": "2008-02-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "acroread: silent print vulnerability" }, { "cve": "CVE-2008-0726", "discovery_date": "2008-02-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "432757" } ], "notes": [ { "category": "description", "text": "Integer overflow in Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via crafted arguments to the printSepsWithParams, which triggers memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "Acroread memory corruption", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0726" }, { "category": "external", "summary": "RHBZ#432757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0726", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0726" } ], "release_date": "2008-02-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-02-22T16:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "3AS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3AS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-0:8.1.2-1.el3.6.i386", "3Desktop-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-0:8.1.2-1.el3.6.i386", "3ES-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-0:8.1.2-1.el3.6.i386", "3WS-LACD:acroread-plugin-0:8.1.2-1.el3.6.i386", "4AS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4AS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-0:8.1.2-1.el4.2.i386", "4Desktop-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-0:8.1.2-1.el4.2.i386", "4ES-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-0:8.1.2-1.el4.2.i386", "4WS-LACD:acroread-plugin-0:8.1.2-1.el4.2.i386", "5Client-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Client-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-0:8.1.2-1.el5.3.i386", "5Server-Supplementary:acroread-plugin-0:8.1.2-1.el5.3.i386" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0144" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Acroread memory corruption" } ] }
ghsa-f6hj-jcpc-rwr6
Vulnerability from github
Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader's current working directory. NOTE: this issue might be subsumed by CVE-2008-0655.
{ "affected": [], "aliases": [ "CVE-2007-5666" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-02-12T19:00:00Z", "severity": "MODERATE" }, "details": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655.", "id": "GHSA-f6hj-jcpc-rwr6", "modified": "2022-05-01T18:35:42Z", "published": "2022-05-01T18:35:42Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5666" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161" }, { "type": "WEB", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655" }, { "type": "WEB", "url": "http://secunia.com/advisories/29065" }, { "type": "WEB", "url": "http://secunia.com/advisories/29205" }, { "type": "WEB", "url": "http://secunia.com/advisories/30840" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1" }, { "type": "WEB", "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html" }, { "type": "WEB", "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/1966/references" } ], "schema_version": "1.4.0", "severity": [] }
CERTA-2008-AVI-053
Vulnerability from certfr_avis
None
Description
Des vulnérabilités non spécifiées ont été annoncées par l'éditeur. Certaines pourraient être exploitées par des personnes malveillantes afin d'exécuter du code arbitraire à distance sur un système ayant une version d'Adobe Reader vulnérable.
D'autres vulnérabilités permettraient de contourner la politique de sécurité mise en place dans un document.
Solution
Se référer au bulletin de sécurité kb403079 d'Adobe pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Adobe Reader, pour les versions ant\u00e9rieures \u00e0 8.1.2.", "product": { "name": "N/A", "vendor": { "name": "Adobe", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nDes vuln\u00e9rabilit\u00e9s non sp\u00e9cifi\u00e9es ont \u00e9t\u00e9 annonc\u00e9es par l\u0027\u00e9diteur.\nCertaines pourraient \u00eatre exploit\u00e9es par des personnes malveillantes\nafin d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance sur un syst\u00e8me ayant une\nversion d\u0027Adobe Reader vuln\u00e9rable.\n\nD\u0027autres vuln\u00e9rabilit\u00e9s permettraient de contourner la politique de\ns\u00e9curit\u00e9 mise en place dans un document.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 kb403079 d\u0027Adobe pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2007-5663", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5663" }, { "name": "CVE-2007-4768", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4768" }, { "name": "CVE-2007-5666", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5666" }, { "name": "CVE-2008-2042", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2042" }, { "name": "CVE-2007-5659", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5659" }, { "name": "CVE-2008-0667", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0667" }, { "name": "CVE-2008-0655", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0655" }, { "name": "CVE-2008-0726", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0726" } ], "initial_release_date": "2008-02-06T00:00:00", "last_revision_date": "2008-05-13T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSB08-13 publi\u00e9 le 06 mai 2008 :", "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html" }, { "title": "Note d\u0027information de changement de version Adobe kb403079 du 05 f\u00e9vrier 2008 :", "url": "http://www.adobe.com/go/kb403079" }, { "title": "Bulletin de s\u00e9curit\u00e9 Adobe APSA08-01 publi\u00e9 le 07 f\u00e9vrier 2008 :", "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html" } ], "reference": "CERTA-2008-AVI-053", "revisions": [ { "description": "version initiale.", "revision_date": "2008-02-06T00:00:00.000000" }, { "description": "modification des risques et ajout des r\u00e9f\u00e9rences au CVE et au bulletin APSA08-01.", "revision_date": "2008-02-08T00:00:00.000000" }, { "description": "ajout de r\u00e9f\u00e9rences aux CVE.", "revision_date": "2008-03-06T00:00:00.000000" }, { "description": "ajout de r\u00e9f\u00e9rences aux CVE et APSB08-13 mentionnant la mise \u00e0 disposition du correctif pour la branche 7 Adobe Reader.", "revision_date": "2008-05-13T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": null, "title": "Multiples vuln\u00e9rabilit\u00e9s dans Adobe Reader", "vendor_advisories": [ { "published_at": null, "title": "Bulletin kb403079 d\u0027Adobe publi\u00e9 le 05 f\u00e9vrier 2008", "url": null } ] }
fkie_cve-2007-5666
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655 | ||
cve@mitre.org | http://secunia.com/advisories/29065 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/29205 | ||
cve@mitre.org | http://secunia.com/advisories/30840 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200803-01.xml | ||
cve@mitre.org | http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1 | ||
cve@mitre.org | http://www.adobe.com/support/security/advisories/apsa08-01.html | Patch | |
cve@mitre.org | http://www.adobe.com/support/security/bulletins/apsb08-13.html | ||
cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0144.html | ||
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA08-043A.html | US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2008/1966/references | ||
cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29065 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29205 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30840 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200803-01.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/advisories/apsa08-01.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.adobe.com/support/security/bulletins/apsb08-13.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0144.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-043A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1966/references | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161 |
Vendor | Product | Version | |
---|---|---|---|
adobe | acrobat | * | |
adobe | acrobat_reader | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A068220-ADFE-46F0-AE35-3355BEFEECD9", "versionEndIncluding": "8.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "matchCriteriaId": "82321E60-2553-41E2-A4F4-375CFF011C0A", "versionEndIncluding": "8.1.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655." }, { "lang": "es", "value": "Vulnerabilidad de ruta de b\u00fasqueda no confiable en Adobe Reader y Acrobat 8.1.1 y anteriores permite a usuarios locales ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una librer\u00eda maliciosa del proveedor de Seguridad en el directorio de trabajo actual de los lectores. NOTA: este asunto podr\u00eda estar subsumido por CVE-2008-0655." } ], "id": "CVE-2007-5666", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-12T19:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29065" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29205" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30840" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html" }, { "source": "cve@mitre.org", "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1966/references" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29205" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1966/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2007-5666
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2007-5666", "description": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655.", "id": "GSD-2007-5666", "references": [ "https://access.redhat.com/errata/RHSA-2008:0144" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-5666" ], "details": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655.", "id": "GSD-2007-5666", "modified": "2023-12-13T01:21:40.972738Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5666", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA08-043A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb08-13.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html" }, { "name": "ADV-2008-1966", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1966/references" }, { "name": "oval:org.mitre.oval:def:11161", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161" }, { "name": "http://www.adobe.com/support/security/advisories/apsa08-01.html", "refsource": "CONFIRM", "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html" }, { "name": "239286", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1" }, { "name": "GLSA-200803-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml" }, { "name": "29065", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29065" }, { "name": "30840", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30840" }, { "name": "29205", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29205" }, { "name": "20080208 Adobe Reader Security Provider Unsafe Libary Path Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655" }, { "name": "RHSA-2008:0144", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.1.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.1.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5666" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Untrusted search path vulnerability in Adobe Reader and Acrobat 8.1.1 and earlier allows local users to execute arbitrary code via a malicious Security Provider library in the reader\u0027s current working directory. NOTE: this issue might be subsumed by CVE-2008-0655." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-94" } ] } ] }, "references": { "reference_data": [ { "name": "20080208 Adobe Reader Security Provider Unsafe Libary Path Vulnerability", "refsource": "IDEFENSE", "tags": [], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=655" }, { "name": "http://www.adobe.com/support/security/advisories/apsa08-01.html", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://www.adobe.com/support/security/advisories/apsa08-01.html" }, { "name": "TA08-043A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-043A.html" }, { "name": "RHSA-2008:0144", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0144.html" }, { "name": "29065", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29065" }, { "name": "GLSA-200803-01", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200803-01.xml" }, { "name": "29205", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29205" }, { "name": "http://www.adobe.com/support/security/bulletins/apsb08-13.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.adobe.com/support/security/bulletins/apsb08-13.html" }, { "name": "239286", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-239286-1" }, { "name": "30840", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30840" }, { "name": "ADV-2008-1966", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2008/1966/references" }, { "name": "oval:org.mitre.oval:def:11161", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11161" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-29T01:29Z", "publishedDate": "2008-02-12T19:00Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.