February 8, 2011 - Qualys® Vulnerability R&D Lab has released new vulnerability checks in QualysGuard® to protect organizations against a vulnerability present in Adobe that was announced today. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their QualysGuard subscription.
Adobe has released one security patch to fix newly discovered flaws in Adobe Reader.
Qualys has released the following checks for these new vulnerabilities:
|Adobe Reader and Acrobat Security Update (APSB11-03)|
|SEVERITY: Urgent 5|
|QUALYS ID: 118956|
|VENDOR REFERENCE: APSB11-03|
|CVE REFERENCE: CVE-2010-4091 | CVE-2011-0562 | CVE-2011-0563 | CVE-2011-0564 | CVE-2011-0565 | CVE-2011-0566 | CVE-2011-0567 | CVE-2011-0568 | CVE-2011-0570 | CVE-2011-0585 | CVE-2011-0586 | CVE-2011-0587 | CVE-2011-0588 | CVE-2011-0589 | CVE-2011-0590 | CVE-2011-0591 | CVE-2011-0592 | CVE-2011-0593 | CVE-2011-0594 | CVE-2011-0595 | CVE-2011-0596 | CVE-2011-0598 | CVE-2011-0599 | CVE-2011-0600 | CVE-2011-0602 | CVE-2011-0603 | CVE-2011-0604 | CVE-2011-0605 | CVE-2011-0606|
|CVSS SCORES: Base 9.3/ Temporal 6.9|
|THREAT: Adobe Acrobat and Reader are applications for handling PDF files.
A critical vulnerability exists in Adobe Reader and Adobe Acrobat. Adobe has released a security update to fix the following issues.
An input validation vulnerability that could lead to code execution (CVE-2010-4091,CVE-2011-0586,CVE-2011-0587).
A library-loading vulnerability that could lead to code execution (CVE-2011-0562,CVE-2011-0588,CVE-2011-0570).
A memory corruption vulnerability that could lead to code execution (CVE-2011-0563,CVE-2011-0589,CVE-2011-0606,CVE-2011-0605).
A Windows-only file permissions issue that could lead to privilege escalation (CVE-2011-0564).
Multiple denial of service and possible arbitrary code execution vulnerabilities (CVE-2011-0565,CVE-2011-0568,CVE-2011-0585).
An image-parsing memory corruption vulnerability that could lead to code execution (CVE-2011-0603,CVE-2011-0566,CVE-2011-0567).
A 3D file parsing input validation vulnerability that could lead to code execution (CVE-2011-0600,CVE-2011-0595,CVE-2011-0590,CVE-2011-0591,CVE-2011-0592,CVE-2011-0593).
A font parsing input validation vulnerability that could lead to code execution (CVE-2011-0594).
An image parsing input validation vulnerability that could lead to code execution (CVE-2011-0596,CVE-2011-0598,CVE-2011-0599,CVE-2011-0602).
An input validation vulnerability that could lead to cross-site scripting (CVE-2011-0604).
|IMPACT: Successful exploitation allows attackers to crash the application and potentially allow an attacker to take control of the affected system.|
|SOLUTION: The vendor released updates to resolve this issue. Refer to vendor advisory APSB11-03 for more information.|
This new vulnerability check is included in Qualys vulnerability signatures v1.28.13-3. Each QualysGuard account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the QualysGuard HOME menu, select the Account Info tab.
SELECTIVE SCAN INSTRUCTIONS USING QUALYSGUARD:
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
- Enable the following Qualys IDs:
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if QualysGuard is unable to logon to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Matrix Report, available from the QualysGuard HOME page.
US: 1 866.801.6161 | EMEA: 33 1 44.17.00.41 | UK: +44 1753 872102
Access for QualysGuard customers: https://qualysguard.qualys.com
Free trial of QualysGuard service: http://www.qualys.com/forms/trials/qualysguard_trial/