RHEL 4 / 5 / 6 : acroread (RHSA-2011:1434)

critical Nessus Plugin ID 56740

Synopsis

遠端 Red Hat 主機缺少一個或多個安全性更新。

描述

現已提供適用於 Red Hat Enterprise Linux 4 Extras、Red Hat Enterprise Linux 5 和 6 Supplementary 的更新版 acroread 套件,可修正多個安全性問題。

Red Hat 安全性回應團隊已將此更新評為具有重大安全性影響。可針對每個弱點從〈參照〉一節的 CVE 連結中取得常見弱點評分系統 (CVSS) 的基本分數,其中包含有關嚴重性評等的詳細資訊。

Adobe Reader 可讓使用者檢視和列印可攜式文件格式 (Portable Document Format, PDF) 的文件。

此更新將修正 Adobe Reader 中的多個安全性瑕疵。這些瑕疵於 Adobe 安全性頁面 APSB11-24 中詳述,列在<參照>一節中。特製的 PDF 檔案可導致 Adobe Reader 當機,或可能在開啟時以執行 Adobe Reader 的使用者身分執行任意程式碼。(CVE-2011-2431、CVE-2011-2432、CVE-2011-2433、CVE-2011-2434、CVE-2011-2435、CVE-2011-2436、CVE-2011-2437、CVE-2011-2438、CVE-2011-2439、CVE-2011-2440、CVE-2011-2442)

此更新也可修正 Adobe Reader 中內嵌的 Adobe Flash Player 之多個安全性瑕疵。Adobe 安全性頁面 APSB11-21 和 APSB11-26 會詳細說明這些瑕疵,如<參照>一節中所列。

含有內嵌特製 SWF 檔案的 PDF 檔案可造成 Adobe Reader 當機,或可能在開啟時以執行 Adobe Reader 的使用者身分執行任意程式碼。(CVE-2011-2130、CVE-2011-2134、CVE-2011-2135、CVE-2011-2136、CVE-2011-2137、CVE-2011-2138、CVE-2011-2139、CVE-2011-2140、CVE-2011-2414、CVE-2011-2415、CVE-2011-2416、CVE-2011-2417、CVE-2011-2424、CVE-2011-2425、CVE-2011-2426、CVE-2011-2427、CVE-2011-2428、CVE-2011-2430)

Adobe Flash Player 中的一個瑕疵可允許攻擊者誘騙受害者造訪特製網頁,藉此發動跨網站指令碼 (XSS) 攻擊。(CVE-2011-2444)

此更新也可修正 Adobe Flash Player 中的一個資訊洩漏瑕疵。(CVE-2011-2429)

所有 Adobe Reader 使用者皆應安裝這些更新版套件。這其中包含 Adobe Reader 9.4.6 版,此版本不容易發生這些問題。所有執行中的 Adobe Reader 執行個體都必須重新啟動,更新才會生效。

解決方案

更新受影響的 acroread 和/或 acroread-plugin 套件。

另請參閱

https://access.redhat.com/security/cve/cve-2011-2094

https://access.redhat.com/security/cve/cve-2011-2095

https://access.redhat.com/security/cve/cve-2011-2096

https://access.redhat.com/security/cve/cve-2011-2097

https://access.redhat.com/security/cve/cve-2011-2098

https://access.redhat.com/security/cve/cve-2011-2099

https://access.redhat.com/security/cve/cve-2011-2101

https://access.redhat.com/security/cve/cve-2011-2104

https://access.redhat.com/security/cve/cve-2011-2105

https://access.redhat.com/security/cve/cve-2011-2107

https://access.redhat.com/security/cve/cve-2011-2130

https://access.redhat.com/security/cve/cve-2011-2134

https://access.redhat.com/security/cve/cve-2011-2135

https://access.redhat.com/security/cve/cve-2011-2136

https://access.redhat.com/security/cve/cve-2011-2137

https://access.redhat.com/security/cve/cve-2011-2138

https://access.redhat.com/security/cve/cve-2011-2139

https://access.redhat.com/security/cve/cve-2011-2140

https://access.redhat.com/security/cve/cve-2011-2414

https://access.redhat.com/security/cve/cve-2011-2415

https://access.redhat.com/security/cve/cve-2011-2416

https://access.redhat.com/security/cve/cve-2011-2417

https://access.redhat.com/security/cve/cve-2011-2424

https://access.redhat.com/security/cve/cve-2011-2425

https://access.redhat.com/security/cve/cve-2011-2426

https://access.redhat.com/security/cve/cve-2011-2427

https://access.redhat.com/security/cve/cve-2011-2428

https://access.redhat.com/security/cve/cve-2011-2429

https://access.redhat.com/security/cve/cve-2011-2430

https://access.redhat.com/security/cve/cve-2011-2431

https://access.redhat.com/security/cve/cve-2011-2432

https://access.redhat.com/security/cve/cve-2011-2433

https://access.redhat.com/security/cve/cve-2011-2434

https://access.redhat.com/security/cve/cve-2011-2435

https://access.redhat.com/security/cve/cve-2011-2436

https://access.redhat.com/security/cve/cve-2011-2437

https://access.redhat.com/security/cve/cve-2011-2438

https://access.redhat.com/security/cve/cve-2011-2439

https://access.redhat.com/security/cve/cve-2011-2440

https://access.redhat.com/security/cve/cve-2011-2442

https://access.redhat.com/security/cve/cve-2011-2444

https://access.redhat.com/security/cve/cve-2011-4374

https://www.adobe.com/support/security/bulletins/apsb11-21.html

https://www.adobe.com/support/security/bulletins/apsb11-24.html

https://www.adobe.com/support/security/bulletins/apsb11-26.html

https://access.redhat.com/errata/RHSA-2011:1434

Plugin 詳細資訊

嚴重性: Critical

ID: 56740

檔案名稱: redhat-RHSA-2011-1434.nasl

版本: 1.29

類型: local

代理程式: unix

已發布: 2011/11/9

已更新: 2021/1/14

支持的傳感器: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

風險資訊

VPR

風險因素: Critical

分數: 9.7

CVSS v2

風險因素: Critical

基本分數: 10

時間分數: 8.7

媒介: AV:N/AC:L/Au:N/C:C/I:C/A:C

時間媒介: E:H/RL:OF/RC:C

弱點資訊

CPE: p-cpe:/a:redhat:enterprise_linux:acroread, p-cpe:/a:redhat:enterprise_linux:acroread-plugin, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:6, cpe:/o:redhat:enterprise_linux:6.1

必要的 KB 項目: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2011/11/8

弱點發布日期: 2011/6/8

惡意利用途徑

Core Impact

Metasploit (Adobe Flash Player MP4 SequenceParameterSetNALUnit Buffer Overflow)

參考資訊

CVE: CVE-2011-2094, CVE-2011-2095, CVE-2011-2096, CVE-2011-2097, CVE-2011-2098, CVE-2011-2099, CVE-2011-2101, CVE-2011-2104, CVE-2011-2105, CVE-2011-2107, CVE-2011-2130, CVE-2011-2134, CVE-2011-2135, CVE-2011-2136, CVE-2011-2137, CVE-2011-2138, CVE-2011-2139, CVE-2011-2140, CVE-2011-2414, CVE-2011-2415, CVE-2011-2416, CVE-2011-2417, CVE-2011-2424, CVE-2011-2425, CVE-2011-2426, CVE-2011-2427, CVE-2011-2428, CVE-2011-2429, CVE-2011-2430, CVE-2011-2431, CVE-2011-2432, CVE-2011-2433, CVE-2011-2434, CVE-2011-2435, CVE-2011-2436, CVE-2011-2437, CVE-2011-2438, CVE-2011-2439, CVE-2011-2440, CVE-2011-2442, CVE-2011-2444, CVE-2011-4374

BID: 49073, 49074, 49075, 49076, 49077, 49079, 49080, 49081, 49082, 49083, 49084, 49085, 49086, 49186, 49572, 49575, 49576, 49577, 49578, 49579, 49580, 49582, 49583, 49584, 49585, 49710, 49714, 49715, 49716, 49717, 49718

RHSA: 2011:1434