openSUSE Security Update: acroread security update ______________________________________________________________________________ Announcement ID: openSUSE-SU-2010:1030-1 Rating: important References: #651232 Cross-References: CVE-2010-3654 CVE-2010-4091 Affected Products: openSUSE 11.3 openSUSE 11.2 openSUSE 11.1 ______________________________________________________________________________ An update that fixes two vulnerabilities is now available. It includes one version update. Description: This update of acroread fixes two critical vulnerabilities. The first one in referenced by CVE-2010-3654 and exists in the integrated authplay component that may allow remote attackers to take control over a victims system. (CVE-2010-3654: CVSS v2 Base Score: 6.8 (critical) (AV:N/AC:M/Au:N/C:P/I:P/A:P): Buffer Errors (CWE-119)) The other issue was disclosed on full-disclosure to demonstrate a denial of service attack, an extend of this attack to execute arbitrary code could be possible. (CVE-2010-4091: CVSS v2 Base Score: 6.8 (critical) (AV:N/AC:M/Au:N/C:P/I:P/A:P): Buffer Errors (CWE-119)) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.3: zypper in -t patch acroread-3653 - openSUSE 11.2: zypper in -t patch acroread-3653 - openSUSE 11.1: zypper in -t patch acroread-3653 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.3 (i586) [New Version: 9.4.1]: acroread-9.4.1-0.2.1 - openSUSE 11.2 (noarch) [New Version: 9.4.1]: acroread-cmaps-9.4.1-0.2.1 acroread-fonts-ja-9.4.1-0.2.1 acroread-fonts-ko-9.4.1-0.2.1 acroread-fonts-zh_CN-9.4.1-0.2.1 acroread-fonts-zh_TW-9.4.1-0.2.1 - openSUSE 11.2 (i586) [New Version: 9.4.1]: acroread-9.4.1-0.2.1 - openSUSE 11.1 (noarch) [New Version: 9.4.1]: acroread-cmaps-9.4.1-0.2.1 acroread-fonts-ja-9.4.1-0.2.1 acroread-fonts-ko-9.4.1-0.2.1 acroread-fonts-zh_CN-9.4.1-0.2.1 acroread-fonts-zh_TW-9.4.1-0.2.1 - openSUSE 11.1 (i586) [New Version: 9.4.1]: acroread-9.4.1-0.2.1 References: http://support.novell.com/security/cve/CVE-2010-3654.html http://support.novell.com/security/cve/CVE-2010-4091.html https://bugzilla.novell.com/651232