[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS Brief - 783/06 - AUSCERT ALERT: AL-2006.0115 - Potential vulnerabilities in Adobe Reader and Acroba



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------------------------
       UNIRAS (UK Government CERT) Briefing 783/06 Dated 30.11.06 Time 13:15  

UNIRAS is part of NISCC (the UK National Infrastructure Security  Co-ordination Centre)
- ---------------------------------------------------------------------------------------
 	UNIRAS material is available from the NISCC website at www.niscc.gov.uk
- ---------------------------------------------------------------------------------------

Title
=====

AUSCERT ALERT: AL-2006.0115 - Potential vulnerabilities in Adobe Reader and Acroba 
                                   
Detail
======

Adobe is aware of a recently published report of potential vulnerabilities in Adobe Reader and Acrobat. These vulnerabilities would
cause the application to crash and could potentially allow an attacker to take control of the affected system.


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
A  U  S  C  E  R  T                                           A  L  E  R  T

                       AL-2006.0115 -- AUSCERT ALERT
                                   [Win]
           Potential vulnerabilities in Adobe Reader and Acrobat
                             30 November 2006

===========================================================================

        AusCERT Alert Summary
        ---------------------

Product:              Adobe Reader 7.0.0 to 7.0.8
                      Adobe Acrobat Standard and Professional 7.0.0 to 7.0.8
Publisher:            Adobe
Operating System:     Windows
Impact:               Execute Arbitrary Code/Commands
Access:               Remote/Unauthenticated
CVE Names:            CVE-2006-6072

Original Bulletin:   
  http://www.adobe.com/support/security/advisories/apsa06-02.html

- - --------------------------BEGIN INCLUDED TEXT--------------------

Potential vulnerabilities in Adobe Reader and Acrobat

Release date: November 28, 2006

Vulnerability identifier: APSA06-02

CVE number: CVE-2006-6027

Platform: Windows

Summary

Adobe is aware of a recently published report of potential vulnerabilities in Adobe Reader and Acrobat. These vulnerabilities would
cause the application to crash and could potentially allow an attacker to take control of the affected system.

Affected software versions

Adobe Reader 7.0.0 through 7.0.8 and Adobe Acrobat Standard and Professional 7.0.0 through 7.0.8 on the Windows platform when using
Internet Explorer. Users of other browsers are not affected.

Solution

The Secure Software Engineering team is working with the Adobe Reader Engineering team on an update to Adobe Reader and Acrobat
7.0.8 that will resolve these issues, which is expected to be available in the near future. 
A security bulletin will be published on http://www.adobe.com/support/security
as soon as that update is available.

The upcoming version of Adobe Reader, which will not be vulnerable to this issue, is also expected to be available in the near
future. Acrobat 8 is not affected by this issue. The vulnerability is in an ActiveX control used by Internet Explorer; users of
other browsers are not affected. The following workaround will prevent these vulnerabilities from occurring in Adobe Reader 7.0.X on
Windows using Internet Explorer:

   1. Exit Internet Explorer and Adobe Reader.
   2. Browse to <volume>:\Program Files\Adobe\Acrobat 7.0\ActiveX.
      Note: If you did not install Acrobat to the default location, browse to
      the location of your Acrobat 7.0 folder.
   3. Select AcroPDF.dll and delete it.

NOTE: This workaround will prevent PDF documents from opening within an Internet Explorer window. After applying this workaround,
clicking on PDF files within Internet Explorer will either open in a separate instance of Adobe Reader or the user will be prompted
to download the file, which can then be opened in Adobe Reader. This workaround may disrupt some enterprise workflows and use of PDF
forms.

All documented security vulnerabilities and their solutions are distributed through the Adobe security notification service. You can
sign up for the service at the following URL: 
http://www.adobe.com/cfusion/entitlement/index.cfm?e=szalert.

Severity rating

Adobe categorizes this as a critical issue.

Acknowledgments

Adobe would like to thank FrSIRT.com for reporting these vulnerabilities and for working with us to help protect our customers'
security.

Adobe disclaimer
License agreement

By using software of Adobe Systems Incorporated or its subsidiaries ("Adobe"); you agree to the following terms and conditions. If
you do not agree with such terms and conditions; do not use the software. The terms of an end user license agreement accompanying a
particular software file upon installation or download of the software shall supersede the terms presented below.

The export and re-export of Adobe software products are controlled by the United States Export Administration Regulations and such
software may not be exported or re-exported to Cuba; Iran; Iraq; Libya; North Korea; Sudan; or Syria or any country to which the
United States embargoes goods. In addition; Adobe software may not be distributed to persons on the Table of Denial Orders; the
Entity List; or the List of Specially Designated Nationals.

By downloading or using an Adobe software product you are certifying that you are not a national of Cuba; Iran; Iraq; Libya; North
Korea; Sudan; or Syria or any country to which the United States embargoes goods and that you are not a person on the Table of
Denial Orders; the Entity List; or the List of Specially Designated Nationals.

If the software is designed for use with an application software product (the "Host Application") published by Adobe; Adobe grants
you a non-exclusive license to use such software with the Host Application only; provided you possess a valid license from Adobe for
the Host Application. Except as set forth below; such software is licensed to you subject to the terms and conditions of the End
User License Agreement from Adobe governing your use of the Host Application.

DISCLAIMER OF WARRANTIES: YOU AGREE THAT ADOBE HAS MADE NO EXPRESS WARRANTIES TO YOU REGARDING THE SOFTWARE AND THAT THE SOFTWARE IS
BEING PROVIDED TO YOU "AS IS" WITHOUT WARRANTY OF ANY KIND. ADOBE DISCLAIMS ALL WARRANTIES WITH REGARD TO THE SOFTWARE; EXPRESS OR
IMPLIED; INCLUDING; WITHOUT LIMITATION; ANY IMPLIED WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE; MERCHANTABILITY; MERCHANTABLE
QUALITY OR NONINFRINGEMENT OF THIRD PARTY RIGHTS. Some states or jurisdictions do not allow the exclusion of implied warranties; so
the above limitations may not apply to you.

LIMIT OF LIABILITY: IN NO EVENT WILL ADOBE BE LIABLE TO YOU FOR ANY LOSS OF USE; INTERRUPTION OF BUSINESS; OR ANY DIRECT; INDIRECT;
SPECIAL; INCIDENTAL; OR CONSEQUENTIAL DAMAGES OF ANY KIND (INCLUDING LOST PROFITS) REGARDLESS OF THE FORM OF ACTION WHETHER IN
CONTRACT; TORT (INCLUDING NEGLIGENCE); STRICT PRODUCT LIABILITY OR OTHERWISE; EVEN IF ADOBE HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. Some states or jurisdictions do not allow the exclusion or limitation of incidental or consequential damages; so the
above limitation or exclusion may not apply to you. 

- - --------------------------END INCLUDED TEXT--------------------


===========================================================================
Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072

Internet Email: auscert@xxxxxxxxxxxxxx
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

- -----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRW5djSh9+71yA2DNAQLPqAP/fEUFEnP1oh7LHZ4bEPUhyhaegqIdEJG1
mIl2FX98QQZ3okVmTwAkn54uidQcX9phLXcTSQxeZOKKAiqk72cBfHC/Ad4gqut9
Oz+JxqEn4RVAw/BsI0Y+BTsjr0zQ1Uo+np21dtsa4j/UVblBu7v/60aeWWkStXH8
l+DXgv3bySQ=
=60PE
- -----END PGP SIGNATURE-----



- ---------------------------------------------------------------------------------------
NISCC values your feedback.

1. Which of the following most reflects the value of the briefing to you?
   (Place an 'X' next to your choice)

	Very useful:__ Useful:__ Not useful:__ 

2. If you did not find it useful, why not?


3. Any other comments? How could we improve our briefings?


Thank you for your contribution.
- ---------------------------------------------------------------------------------------

For additional information or assistance, please contact our help desk by telephone.  
You may send Not Protectively Marked information via e-mail to uniras@xxxxxxxxxxxxx

Office hours:

Mon - Fri: 08:30 - 17:00 hours
Tel: +44 (0) 870 487 0748 and follow the voice prompts
Fax: +44 (0) 870 487 0749

On-call duty officer outside office hours:
Tel: +44 (0) 870 487 0748 and follow the voice prompts

- ---------------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of Auscert for the information contained 

in this briefing.
- ---------------------------------------------------------------------------------------

This notice contains information released by the original author. Some of the information may have changed since it was released. If
the vulnerability affects you, it may be prudent to retrieve the advisory from the site of the original source to ensure that you
receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade name, trademark manufacturer, or otherwise, does not
constitute or imply its endorsement, recommendation, or favouring by UNIRAS or NISCC. The views and opinions of authors expressed
within this notice shall not be used for advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors or omissions contained within this briefing notice. In
particular, they shall not be liable for any loss or damage whatsoever, arising from or in connection with the usage of information
contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) and has contacts with other international Incident
Response Teams (IRTs) in order to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents,
and to promote information sharing amongst its members and the community at large.
- ---------------------------------------------------------------------------------------
<End of UNIRAS Briefing>



-----BEGIN PGP SIGNATURE-----
Version: PGP 8.1

iQA/AwUBRW7Yhml7oeQsXfKvEQIPDQCbBWj2QHjmutji1af6o51XfqcMnA8AoNRB
Az64RTsvfrTj5Ejz/f+Q6KqK
=AaY+
-----END PGP SIGNATURE-----


______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________

______________________________________________________________________
This email has been scanned by the MessageLabs Email Security System.
For more information please visit http://www.messagelabs.com/email 
______________________________________________________________________