Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69044
Category:Gentoo Local Security Checks
Title:Gentoo Security Advisory GLSA 201101-08 (acroread)
Summary:The remote host is missing updates announced in;advisory GLSA 201101-08.
Description:Summary:
The remote host is missing updates announced in
advisory GLSA 201101-08.

Vulnerability Insight:
Multiple vulnerabilities in Adobe Reader might result in the execution of
arbitrary code.

Solution:
All Adobe Reader users should upgrade to the latest stable version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=app-text/acroread-9.4.1'

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-2883
BugTraq ID: 43057
http://www.securityfocus.com/bid/43057
Cert/CC Advisory: TA10-279A
http://www.us-cert.gov/cas/techalerts/TA10-279A.html
CERT/CC vulnerability note: VU#491991
http://www.kb.cert.org/vuls/id/491991
http://security.gentoo.org/glsa/glsa-201101-08.xml
http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html
http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11586
http://www.redhat.com/support/errata/RHSA-2010-0743.html
http://secunia.com/advisories/41340
http://secunia.com/advisories/43025
SuSE Security Announcement: SUSE-SA:2010:048 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00001.html
SuSE Security Announcement: SUSE-SR:2010:019 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
TurboLinux Advisory: TLSA-2011-2
http://www.turbolinux.co.jp/security/2011/TLSA-2011-2j.txt
http://www.vupen.com/english/advisories/2010/2331
http://www.vupen.com/english/advisories/2011/0191
http://www.vupen.com/english/advisories/2011/0344
XForce ISS Database: adobe-reader-cooltype-code-execution(61635)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61635
Common Vulnerability Exposure (CVE) ID: CVE-2010-2884
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Cert/CC Advisory: TA10-263A
http://www.us-cert.gov/cas/techalerts/TA10-263A.html
CERT/CC vulnerability note: VU#275289
http://www.kb.cert.org/vuls/id/275289
http://security.gentoo.org/glsa/glsa-201101-09.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6852
http://www.redhat.com/support/errata/RHSA-2010-0706.html
http://secunia.com/advisories/41434
http://secunia.com/advisories/41435
http://secunia.com/advisories/41443
http://secunia.com/advisories/41526
http://secunia.com/advisories/43026
http://www.vupen.com/english/advisories/2010/2348
http://www.vupen.com/english/advisories/2010/2349
http://www.vupen.com/english/advisories/2011/0192
XForce ISS Database: adobe-flash-content-code-execution(61771)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61771
Common Vulnerability Exposure (CVE) ID: CVE-2010-2887
BugTraq ID: 43740
http://www.securityfocus.com/bid/43740
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14416
Common Vulnerability Exposure (CVE) ID: CVE-2010-2889
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7009
Common Vulnerability Exposure (CVE) ID: CVE-2010-2890
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6830
Common Vulnerability Exposure (CVE) ID: CVE-2010-3619
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7385
Common Vulnerability Exposure (CVE) ID: CVE-2010-3620
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7589
Common Vulnerability Exposure (CVE) ID: CVE-2010-3621
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7386
Common Vulnerability Exposure (CVE) ID: CVE-2010-3622
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7138
Common Vulnerability Exposure (CVE) ID: CVE-2010-3625
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6772
Common Vulnerability Exposure (CVE) ID: CVE-2010-3626
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7382
Common Vulnerability Exposure (CVE) ID: CVE-2010-3627
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7356
Common Vulnerability Exposure (CVE) ID: CVE-2010-3628
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7455
Common Vulnerability Exposure (CVE) ID: CVE-2010-3629
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7007
Common Vulnerability Exposure (CVE) ID: CVE-2010-3630
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7393
Common Vulnerability Exposure (CVE) ID: CVE-2010-3632
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7057
Common Vulnerability Exposure (CVE) ID: CVE-2010-3654
BugTraq ID: 44504
http://www.securityfocus.com/bid/44504
CERT/CC vulnerability note: VU#298081
http://www.kb.cert.org/vuls/id/298081
http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13294
http://www.redhat.com/support/errata/RHSA-2010-0829.html
http://www.redhat.com/support/errata/RHSA-2010-0834.html
http://www.redhat.com/support/errata/RHSA-2010-0867.html
http://www.redhat.com/support/errata/RHSA-2010-0934.html
http://www.securitytracker.com/id?1024659
http://www.securitytracker.com/id?1024660
http://secunia.com/advisories/41917
http://secunia.com/advisories/42030
http://secunia.com/advisories/42183
http://secunia.com/advisories/42401
http://secunia.com/advisories/42926
http://securityreason.com/securityalert/8210
SuSE Security Announcement: SUSE-SA:2010:055 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html
SuSE Security Announcement: SUSE-SA:2010:058 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00001.html
http://www.vupen.com/english/advisories/2010/2903
http://www.vupen.com/english/advisories/2010/2906
http://www.vupen.com/english/advisories/2010/2918
http://www.vupen.com/english/advisories/2010/3111
http://www.vupen.com/english/advisories/2011/0173
Common Vulnerability Exposure (CVE) ID: CVE-2010-3656
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7484
Common Vulnerability Exposure (CVE) ID: CVE-2010-3657
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6791
Common Vulnerability Exposure (CVE) ID: CVE-2010-3658
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7225
Common Vulnerability Exposure (CVE) ID: CVE-2010-4091
BugTraq ID: 44638
http://www.securityfocus.com/bid/44638
http://www.exploit-db.com/exploits/15419
http://archives.neohapsis.com/archives/fulldisclosure/2010-11/0024.html
http://blogs.adobe.com/psirt/2010/11/potential-issue-in-adobe-reader.html
http://extraexploit.blogspot.com/2010/11/full-disclosure-xplpdf-adober-reader-94.html
http://osvdb.org/69005
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12527
http://www.securitytracker.com/id?1024684
http://www.securitytracker.com/id?1025033
http://secunia.com/advisories/42095
http://www.vupen.com/english/advisories/2010/2890
http://www.vupen.com/english/advisories/2011/0337
XForce ISS Database: adobe-reader-pdf-file-ce(62996)
https://exchange.xforce.ibmcloud.com/vulnerabilities/62996
CopyrightCopyright (C) 2011 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.