RHEL 4/5/6:acroread (RHSA-2011:1434)

critical Nessus 插件 ID 56740
全新!插件严重性现在使用 CVSS v3

计算的插件严重性默认已更新为使用 CVSS v3。没有 CVSS v3 分数的插件将回退到 CVSS v2 来计算严重性。可以在设置下拉列表中切换严重性显示首选项。

简介

远程 Red Hat 主机缺少一个或多个安全更新。

描述

更新后的 acroread 程序包修复了多个安全问题,现在可用于 Red Hat Enterprise Linux 4 Extras 和 Red Hat Enterprise Linux 5 及 6 Supplementary。

Red Hat 安全响应团队已将此更新评级为具有严重安全影响。可从“参考”部分中的 CVE 链接获取针对每个漏洞的通用漏洞评分系统 (CVSS) 基本分数,其给出了详细的严重性等级。

Adobe Reader 允许用户查看和打印可移植文档格式 (PDF) 的文档。

此更新修复了 Adobe Reader 中的多种安全缺陷。有关这些缺陷的详情,请参阅“参考”部分,在 Adobe 安全页面 APSB11-24 中。打开特别构建的 PDF 文件时可导致 Adobe Reader 崩溃,或者以运行 Adobe Reader 的用户的身份执行任意代码。(CVE-2011-2431、CVE-2011-2432、CVE-2011-2433、CVE-2011-2434、CVE-2011-2435、CVE-2011-2436、CVE-2011-2437、CVE-2011-2438、CVE-2011-2439、CVE-2011-2440、CVE-2011-2442)

此更新也可修复 Adobe Reader 中内嵌的 Adobe Flash Player 之多个安全缺陷。“参考”部分中列出的 Adobe 安全页面 APSB11-21 和 APSB11-26 上详细说明了这些漏洞。

打开含有内嵌特别构建的 SWF 文件的 PDF 文件时可导致 Adobe Reader 崩溃,或者以运行 Adobe Reader 的用户的身份执行任意代码。(CVE-2011-2130、CVE-2011-2134、CVE-2011-2135、CVE-2011-2136、CVE-2011-2137、CVE-2011-2138、CVE-2011-2139、CVE-2011-2140、CVE-2011-2414、CVE-2011-2415、CVE-2011-2416、CVE-2011-2417、CVE-2011-2424、CVE-2011-2425、CVE-2011-2426、CVE-2011-2427、CVE-2011-2428、CVE-2011-2430)

如果受害者受到诱骗访问特别构建的网页,Adobe Flash Player 中的缺陷可允许攻击者执行跨站脚本 (XSS) 攻击。(CVE-2011-2444)

此更新还修复了 Adobe Flash Player 中的一个信息泄露缺陷。(CVE-2011-2429)

所有 Adobe Reader 用户都应安装这些更新后的程序包。它们包含 Adobe Reader 版本 9.4.6,不易受到这些问题的影响。必须重新启动所有正在运行的 Adobe Reader 实例才能使更新生效。

解决方案

更新受影响的 acroread 和/或 acroread-plugin 程序包。

另见

https://access.redhat.com/security/cve/cve-2011-2094

https://access.redhat.com/security/cve/cve-2011-2095

https://access.redhat.com/security/cve/cve-2011-2096

https://access.redhat.com/security/cve/cve-2011-2097

https://access.redhat.com/security/cve/cve-2011-2098

https://access.redhat.com/security/cve/cve-2011-2099

https://access.redhat.com/security/cve/cve-2011-2101

https://access.redhat.com/security/cve/cve-2011-2104

https://access.redhat.com/security/cve/cve-2011-2105

https://access.redhat.com/security/cve/cve-2011-2107

https://access.redhat.com/security/cve/cve-2011-2130

https://access.redhat.com/security/cve/cve-2011-2134

https://access.redhat.com/security/cve/cve-2011-2135

https://access.redhat.com/security/cve/cve-2011-2136

https://access.redhat.com/security/cve/cve-2011-2137

https://access.redhat.com/security/cve/cve-2011-2138

https://access.redhat.com/security/cve/cve-2011-2139

https://access.redhat.com/security/cve/cve-2011-2140

https://access.redhat.com/security/cve/cve-2011-2414

https://access.redhat.com/security/cve/cve-2011-2415

https://access.redhat.com/security/cve/cve-2011-2416

https://access.redhat.com/security/cve/cve-2011-2417

https://access.redhat.com/security/cve/cve-2011-2424

https://access.redhat.com/security/cve/cve-2011-2425

https://access.redhat.com/security/cve/cve-2011-2426

https://access.redhat.com/security/cve/cve-2011-2427

https://access.redhat.com/security/cve/cve-2011-2428

https://access.redhat.com/security/cve/cve-2011-2429

https://access.redhat.com/security/cve/cve-2011-2430

https://access.redhat.com/security/cve/cve-2011-2431

https://access.redhat.com/security/cve/cve-2011-2432

https://access.redhat.com/security/cve/cve-2011-2433

https://access.redhat.com/security/cve/cve-2011-2434

https://access.redhat.com/security/cve/cve-2011-2435

https://access.redhat.com/security/cve/cve-2011-2436

https://access.redhat.com/security/cve/cve-2011-2437

https://access.redhat.com/security/cve/cve-2011-2438

https://access.redhat.com/security/cve/cve-2011-2439

https://access.redhat.com/security/cve/cve-2011-2440

https://access.redhat.com/security/cve/cve-2011-2442

https://access.redhat.com/security/cve/cve-2011-2444

https://access.redhat.com/security/cve/cve-2011-4374

https://www.adobe.com/support/security/bulletins/apsb11-21.html

https://www.adobe.com/support/security/bulletins/apsb11-24.html

https://www.adobe.com/support/security/bulletins/apsb11-26.html

https://access.redhat.com/errata/RHSA-2011:1434

插件详情

严重性: Critical

ID: 56740

文件名: redhat-RHSA-2011-1434.nasl

版本: 1.29

类型: local

代理: unix

发布时间: 2011/11/9

最近更新时间: 2021/1/14

依存关系: ssh_get_info.nasl

风险信息

VPR

风险因素: Critical

分数: 9.5

CVSS v2

风险因素: Critical

基本分数: 10

时间分数: 8.7

矢量: AV:N/AC:L/Au:N/C:C/I:C/A:C

时间矢量: E:H/RL:OF/RC:C

漏洞信息

CPE: p-cpe:/a:redhat:enterprise_linux:acroread, p-cpe:/a:redhat:enterprise_linux:acroread-plugin, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.1

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可利用: true

易利用性: Exploits are available

补丁发布日期: 2011/11/8

漏洞发布日期: 2011/6/8

可利用的方式

Core Impact

Metasploit (Adobe Flash Player MP4 SequenceParameterSetNALUnit Buffer Overflow)

参考资料信息

CVE: CVE-2011-2094, CVE-2011-2095, CVE-2011-2096, CVE-2011-2097, CVE-2011-2098, CVE-2011-2099, CVE-2011-2101, CVE-2011-2104, CVE-2011-2105, CVE-2011-2107, CVE-2011-2130, CVE-2011-2134, CVE-2011-2135, CVE-2011-2136, CVE-2011-2137, CVE-2011-2138, CVE-2011-2139, CVE-2011-2140, CVE-2011-2414, CVE-2011-2415, CVE-2011-2416, CVE-2011-2417, CVE-2011-2424, CVE-2011-2425, CVE-2011-2426, CVE-2011-2427, CVE-2011-2428, CVE-2011-2429, CVE-2011-2430, CVE-2011-2431, CVE-2011-2432, CVE-2011-2433, CVE-2011-2434, CVE-2011-2435, CVE-2011-2436, CVE-2011-2437, CVE-2011-2438, CVE-2011-2439, CVE-2011-2440, CVE-2011-2442, CVE-2011-2444, CVE-2011-4374

BID: 49073, 49074, 49075, 49076, 49077, 49079, 49080, 49081, 49082, 49083, 49084, 49085, 49086, 49186, 49572, 49575, 49576, 49577, 49578, 49579, 49580, 49582, 49583, 49584, 49585, 49710, 49714, 49715, 49716, 49717, 49718

RHSA: 2011:1434