Adobe Pushes Security Updates for Adobe Reader and Acrobat
Posted on by Derek Erwin
Adobe Systems has released security updates for Adobe Reader and Adobe Acrobat for Mac and Windows. These updates address a total of 20 vulnerabilities (CVEs), many of which could lead to arbitrary code execution and information disclosure.
According to Adobe’s security bulletin (APSB14-28), affected software versions include:
- Adobe Reader XI (11.0.09) and earlier 11.x versions
- Adobe Reader X (10.1.12) and earlier 10.x versions
- Adobe Acrobat XI (11.0.09) and earlier 11.x versions
- Adobe Acrobat X (10.1.12) and earlier 10.x versions
If you use Adobe Reader or Acrobat, make sure you’ve got the latest version installed. Users of Adobe Reader XI (11.0.09) and earlier versions should update to version 11.0.10. For users of Adobe Reader X (10.1.12) and earlier versions who cannot update to version 11.0.10, Adobe has made available version 10.1.13. Users of Adobe Acrobat XI (11.0.09) and earlier versions should update to version 11.0.10. For users of Adobe Acrobat X (10.1.12) and earlier versions who cannot update to version 11.0.10, Adobe has made available version 10.1.13.
The vulnerabilities patched in these updates are described as follows:
- These updates resolve use-after-free vulnerabilities that could lead to code execution (CVE-2014-8454, CVE-2014-8455, CVE-2014-9165).
- These updates resolve heap-based buffer overflow vulnerabilities that could lead to code execution (CVE-2014-8457, CVE-2014-8460, CVE-2014-9159).
- These updates resolve an integer overflow vulnerability that could lead to code execution (CVE-2014-8449).
- These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2014-8445, CVE-2014-8446, CVE-2014-8447, CVE-2014-8456, CVE-2014-8458, CVE-2014-8459, CVE-2014-8461, CVE-2014-9158).
- These updates resolve a time-of-check time-of-use (TOCTOU) race condition that could be exploited to allow arbitrary write access to the file system (CVE-2014-9150).
- These updates resolve an improper implementation of a Javascript API that could lead to information disclosure (CVE-2014-8448, CVE-2014-8451).
- These updates resolve a vulnerability in the handling of XML external entities that could lead to information disclosure (CVE-2014-8452).
- These updates resolve vulnerabilities that could be exploited to circumvent the same-origin policy (CVE-2014-8453).
Adobe Reader and Acrobat users for Mac and Windows can get updates by utilizing the products update mechanism. (Update checks can be manually activated by choosing Help > Check for Updates.)
Adobe Reader users on Macintosh can find the appropriate update here. Adobe Reader users on Windows can find the appropriate update here.
Acrobat Pro users on Macintosh can find the appropriate update here. Acrobat Standard and Pro users on Windows can find the appropriate update here.