Vulnerability Feeds & WidgetsNew
> Adobe Reader
> Adobe Reader 8.1 And Earlier Vulnerability
Adobe Reader 8.1 And Earlier Vulnerability
This kind of thing is exactly why I come to BC. http://addictech.net/adobe-reader/what-is-adobe-reader-and-do-i-need-it.html
SUSE Linux Security Vulnerability: CVE-2008-2992 Vulnerability Severity: 9 Published: November 03, 2008 Stack-based buffer overflow in Adobe Acrobat and Reader 8.1.2 and earlier allows remote attackers to execute arbitrary code via EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. These vulnerabilities would cause the application to crash and could potentially allow an attacker to take control of the affected system. Corr. 2009-03-24 2009-10-06 9.3 None Remote Medium Not required Complete Complete Complete Adobe Acrobat Reader 9 before 9.1, 8 before 8.1.4, and 7 before 7.1.1 might allow remote attackers to trigger https://www.cvedetails.com/vulnerability-list/vendor_id-53/product_id-15364/version_id-72665/Adobe-Reader-8.1.1.html
Adobe will be providing an update to Adobe Reader 7.0.9 and Acrobat 7.0.9 at a later date. Several functions may not work. Affected software versions Adobe Reader 8.1.2 and earlier versions Adobe Acrobat Professional, 3D and Standard 8.1.2 and earlier versions Solution Adobe Reader Adobe recommends Adobe Reader users update to Adobe Reader Severity rating Adobe categorizes this as a critical issue and recommends that affected users update their product installations.
Contact us if you need to. of China India - English 日本 한국 New Zealand Southeast Asia (Includes Indonesia, Malaysia, Philippines, Singapore, Thailand, and Vietnam) - English 台灣 Commonwealth of Independent States Includes Armenia, Azerbaijan, Belarus, Georgia, Please refer to Microsoft Security Bulletin MS07-061 for more information. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. (e.g.: CVE-2009-1234 or 2010-1234 or 20101234) Log In Register
This issue only affects customers on Windows XP or Windows 2003 with Internet Explorer 7 installed. Start now > Adobe is changing the world through digital experiences. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. NOTE: some of these details are obtained from third party information. 3 CVE-2009-1062 20 Exec Code Mem.
Our creative, marketing and document solutions empower everyone — from emerging artists to global brands — to bring digital creations to life and deliver them to the right person at the Users may monitor the latest information on the Adobe Product Security Incident Response Team blog at the following URL: http://blogs.adobe.com/psirt or by subscribing to the RSS feed here: http://blogs.adobe.com/psirt/atom.xml Revisions March A case like this could easily cost hundreds of thousands of dollars. Avail. 1 CVE-2010-1278 119 Exec Code Overflow 2010-04-22 2010-08-21 9.3 None Remote Medium Not required Complete Complete Complete Buffer overflow in the Atlcom.get_atlcom ActiveX control in gp.ocx in Adobe Download Manager,
NOTE: some of these details are obtained from third party information. 3 CVE-2010-1297 1 DoS Exec Code Mem. https://www.adobe.com/support/security/bulletins/apsb07-18.html A malicious file must be loaded in Adobe Reader or Acrobat by the end user for an attacker to exploit these vulnerabilities. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. Start now > Learn the apps Get started or learn new ways to work.
These vulnerabilities would cause the application to crash and could potentially allow an attacker to take control of the affected system. Adobe recommends users of Acrobat 8 and Adobe Reader 8 who can’t update to Adobe Reader 9 install the 8.1.3 update to protect themselves from potential vulnerabilities. About Us Newsroom Careers At Adobe Privacy Security Corporate Responsibility Customer Showcase Investor Relations Events Contact Us Home Support Security advisories Security bulletin Security Update available for Adobe Reader 8 and weblink A malicious file must be loaded in Adobe Reader or Acrobat by the end user for an attacker to exploit these vulnerabilities.
Products How to Buy Learn & Support About Adobe Creative Cloud Photoshop Illustrator InDesign Premiere Pro After Effects Lightroom See all See plans for: businesses photographers students Document Cloud Acrobat DC For more information, please refer to Security Bulletin APSB09-04. There are NO warranties, implied or otherwise, with regard to this information or its use.
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234) Log In Register