blob: 7768b114887e1385aa9c99b71ac04812927f3138 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200507-09">
<title>Adobe Acrobat Reader: Buffer overflow vulnerability</title>
Adobe Acrobat Reader is vulnerable to a buffer overflow that could lead to
remote execution of arbitrary code.
<product type="ebuild">acroread</product>
<announced>July 11, 2005</announced>
<revised>July 11, 2005: 01</revised>
<package name="app-text/acroread" auto="yes" arch="*">
<unaffected range="ge">7.0</unaffected>
<vulnerable range="le">5.10</vulnerable>
Adobe Acrobat Reader is a utility used to view PDF files.
A buffer overflow has been discovered in the
UnixAppOpenFilePerform() function, which is called when Adobe Acrobat
Reader tries to open a file with the "\Filespec" tag.
<impact type="normal">
By enticing a user to open a specially crafted PDF document, a
remote attacker could exploit this vulnerability to execute arbitrary
There is no known workaround at this time.
Since Adobe will most likely not update the 5.0 series of Adobe
Acrobat Reader for Linux, all users should upgrade to the latest
available version of the 7.0 series:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-text/acroread-7.0&quot;</code>
<uri link="">CAN-2005-1625</uri>
<uri link=";type=vulnerabilities&amp;flashstatus=true">iDEFENSE Security Advisory</uri>
<uri link="">Adobe Security Advisory</uri>
<metadata tag="requester" timestamp="Fri, 08 Jul 2005 08:39:08 +0000">
<metadata tag="submitter" timestamp="Fri, 08 Jul 2005 15:11:50 +0000">
<metadata tag="bugReady" timestamp="Sat, 09 Jul 2005 18:37:26 +0000">