February 6, 2008
Adobe Acrobat and Reader are prone to multiple arbitrary remote code-execution and security vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the user running the affected application. Other attacks are also possible. Versions prior to Adobe Acrobat and Adobe Reader 8.1.2 are vulnerable to these issues.
- Adobe Acrobat 3D
- Adobe Acrobat Professional 7.0.0
- Adobe Acrobat Professional 7.0.1
- Adobe Acrobat Professional 7.0.2
- Adobe Acrobat Professional 7.0.3
- Adobe Acrobat Professional 7.0.4
- Adobe Acrobat Professional 7.0.5
- Adobe Acrobat Professional 7.0.6
- Adobe Acrobat Professional 7.0.7
- Adobe Acrobat Professional 7.0.8
- Adobe Acrobat Professional 8.0
- Adobe Acrobat Professional 8.1
- Adobe Acrobat Professional 8.1.1
- Adobe Acrobat Standard 8.1.1
- Adobe Reader 3.0.0
- Adobe Reader 4.0.0 5
- Adobe Reader 4.0.0 5C
- Adobe Reader 4.0.0
- Adobe Reader 4.0.5 A
- Adobe Reader 5.0.0
- Adobe Reader 5.0.10
- Adobe Reader 5.0.5
- Adobe Reader 5.1.0
- Adobe Reader 6.0.0
- Adobe Reader 6.0.1
- Adobe Reader 6.0.2
- Adobe Reader 6.0.3
- Adobe Reader 6.0.4
- Adobe Reader 7.0.0
- Adobe Reader 7.0.1
- Adobe Reader 7.0.2
- Adobe Reader 7.0.3
- Adobe Reader 7.0.4
- Adobe Reader 7.0.5
- Adobe Reader 7.0.6
- Adobe Reader 7.0.7
- Adobe Reader 7.0.8
- Adobe Reader 7.0.9
- Adobe Reader 8.0
- Adobe Reader 8.1
- Adobe Reader 8.1.1
- Avaya Interactive Response 2.0
- Avaya Interactive Response 3.0
- Gentoo Linux 2007.0
- Gentoo Linux
- Nortel Networks Media Processing Svr 100
- Nortel Networks Media Processing Svr 1000 Rel 3.0
- Nortel Networks Media Processing Svr 500 Rel 3.0
- Nortel Networks Self-Service - Peri Application Rel 3.0
- Nortel Networks Self-Service
- Nortel Networks Self-Service MPS 1000
- Nortel Networks Self-Service MPS 500
- Nortel Networks Self-Service Media Processing Server
- Nortel Networks Self-Service Peri Application
- Nortel Networks Self-Service Speech Server
- Redhat Enterprise Linux Desktop Supplementary 5 Client
- Redhat Enterprise Linux Extras 3
- Redhat Enterprise Linux Extras 4
- Redhat Enterprise Linux Supplementary 5 Server
- SuSE Linux Personal 10.1
- SuSE Linux Professional 10.1
- SuSE SUSE Linux Enterprise SDK 10.SP1
- SuSE SUSE Linux Enterprise Server 10 SP1
- SuSE Suse Linux Enterprise Desktop 10 SP1
- SuSE openSUSE 10.2
- SuSE openSUSE 10.3
- Sun Solaris 10 Sparc
Run all software as a nonprivileged user with minimal access rights.
To limit the potential damage that a successful exploit may achieve, run all nonadministrative software as a regular user with the least amount of privileges required to successfully operate.
Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to requests that include NOP sleds and unexplained incoming and outgoing traffic. This may indicate exploitation attempts or activity that results from successful exploitation.
Do not accept or execute files from untrusted or unknown sources.
Do not use the affected software to open documents that originate from unknown or untrusted sources.
Do not follow links provided by unknown or untrusted sources.
To reduce the likelihood of successful attacks, never follow links provided by unknown or untrusted individuals.
Implement multiple redundant layers of security.
Use memory-protection schemes (such as nonexecutable stack and heap configurations and randomly mapped memory segments) to complicate exploits of memory-corruption vulnerabilities.
Adobe has released updates to address these issues. Please see the references for information on obtaining and applying fixes.
The vendor disclosed these issues. Paul Craig reported the '.joboptions' vulnerability to the vendor.
© 1995- Symantec Corporation
Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Security Response. Reprinting the whole or part of this alert in any medium other than electronically requires permission from firstname.lastname@example.org.
The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.
Symantec, Symantec products, Symantec Security Response, and email@example.com are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners.