Security bulletin for vulnerability in Adobe Reader

Discussion in 'other security issues & news' started by NICK ADSL UK, Oct 22, 2007.

Thread Status:
Not open for further replies.
  1. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,217
    Location:
    UK
    Security bulletin for vulnerability in Adobe Reader
    Security bulletin
    Update available for vulnerability in versions 8.1 and earlier of Adobe Reader and Acrobat

    Affected software versions: Adobe Reader 8.1 and earlier, Adobe Reader 7.0.9 and earlier
    Adobe Acrobat Professional, 3D and Standard 8.1 and earlier versions, Adobe Acrobat Professional, Standard, 3D and Elements 7.0.9 and earlier

    SummaryCritical vulnerabilities have been identified in Adobe Reader and Acrobat that could allow an attacker who successfully exploits these vulnerabilities to take control of the affected system. This issue only affects customers on Windows XP with Internet Explorer 7 installed. A malicious file must be loaded in Adobe Reader or Acrobat by the end user for an attacker to exploit these vulnerabilities. It is recommended that affected users update to Adobe Reader 8.1.1 or Acrobat 8.1.1. This is an update to resolve the issue previously reported in Security Advisory APSA07-04.

    SolutionAdobe strongly recommends upgrading to Adobe Reader 8.1.1 or Acrobat 8.1.1. The Adobe Reader 8.1.1 update files can be manually downloaded and installed from
    http://www.adobe.com/support/downloads/product.jsp?product=10&platform=Windows

    The Acrobat 8.1.1 update files can be downloaded and installed from
    http://www.adobe.com/support/downloads/product.jsp?product=1&platform=Windows

    Microsoft may also be providing an update to resolve this issue at a later date. Please refer to Microsoft Security Advisory 943521 for more information.
    http://www.microsoft.com/technet/security/advisory/943521.mspx

    http://www.adobe.com/support/security/bulletins/apsb07-18.html
     
Loading...
Thread Status:
Not open for further replies.