NOTE: One of the vulnerabilities is currently being actively exploited.
2) An uninitialised memory error in AcroForm.api when processing JPEG image data can be exploited to bypass a recent fix and dereference out-of-bounds memory when a specially crafted PDF file is opened.
3) An array-indexing error in AcroForm.api when parsing GIF image data can be exploited to bypass a size check implemented by a recent fix and cause a heap-based buffer overflow when a specially crafted PDF file is opened.
4) An unspecified error can be exploited to corrupt memory.
5) An error when parsing a CLOD Progressive Mesh Continuation Resolution Update can be exploited to corrupt memory.
6) An unspecified error can be exploited to corrupt memory on *NIX systems.
7) An unspecified error can be exploited to corrupt memory.
8) A use-after-free error may result in a deleted heap object being dereferenced.
9) An unspecified error can be exploited to corrupt memory.
10) An unspecified error can be exploited to corrupt memory.
11) An unspecified error can be exploited to corrupt memory.
Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
The vulnerabilities are reported in:
* Adobe Reader 9.3.2 (and earlier versions) for Windows, Macintosh and UNIX
* Adobe Acrobat 9.3.2 (and earlier versions) for Windows and Macintosh
* Adobe Reader 8.2.2 (and earlier versions) for Windows and Macintosh
* Adobe Acrobat 8.2.2 (and earlier versions) for Windows and Macintosh
NOTE: It has also been reported that content in a certain text field in the file launching warning dialog can be manipulated in a manner that may aid in social-engineering attacks. An error in CoolType.dll was also reported, which may cause an out-of-bounds read access violation and crash the application.
Provided and/or discovered by: 1) Reported as a 0-day.
2) Alin Rad Pop, Secunia Research.
3) Carsten Eiram, Secunia Research.
4) The vendor credits Microsoft Vulnerability Research (MSVR).
5) An anonymous person via ZDI.
6) The vendor credits James Quirk.
7-11) The vendor credits Tavis Ormandy, Google Security Team.
Bug in file launching dialog reported by Didier Stevens and Philippe Lagadec, NATO C3 Agency.
Bug in CoolType.dll library reported by Gjoko Krstic, Zero Science Lab.
Original Advisory: Adobe:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Score: 3 Posts: 1 User Since: 22nd Jun 2010 System Score: N/A Location: ZA Last edited on 22nd Jun, 2010 14:50
Security Advisory for Flash Player, Adobe Reader and Acrobat
Release date: June 4, 2010
Last updated: June 10, 2010
Vulnerability identifier: APSA10-01
CVE number: CVE-2010-1297
A critical vulnerability exists in Adobe Flash Player 10.0.45.2 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems, and the authplay.dll component that ships with Adobe Reader and Acrobat 9.x for Windows, Macintosh and UNIX operating systems. This vulnerability (CVE-2010-1297) could cause a crash and potentially allow an attacker to take control of the affected system. There are reports that this vulnerability is being actively exploited in the wild against both Adobe Flash Player, and Adobe Reader and Acrobat.
Adobe has released a product update to Adobe Flash Player to resolve the relevant security issue. For more information, please refer to Security Bulletin APSB10-14.
We expect to provide an update for Adobe Reader and Acrobat 9.3.2 for Windows, Macintosh and UNIX by June 29, 2010. Please note that the Acrobat and Reader update represents an accelerated release of the next quarterly security update originally scheduled for July 13, 2010. With this accelerated scheduled we do not plan to release any new updates for Adobe Reader and Acrobat on July 13, 2010.
Affected software versions
Adobe Flash Player 10.0.45.2, 9.0.262, and earlier 10.0.x and 9.0.x versions for Windows, Macintosh, Linux and Solaris
Adobe Reader and Acrobat 9.3.2 and earlier 9.x versions for Windows, Macintosh and UNIX
Note: Adobe Reader and Acrobat 8.x are confirmed not vulnerable.