Rapid7 Vulnerability & Exploit Database

APSB11-16: Security updates available for Adobe Reader and Acrobat (CVE-2011-2097)

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

APSB11-16: Security updates available for Adobe Reader and Acrobat (CVE-2011-2097)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
06/14/2011
Created
07/25/2018
Added
06/16/2011
Modified
12/04/2013

Description

Critical vulnerabilities have been identified in Adobe Reader X (10.0.1) and earlier versions for Windows, Adobe Reader X (10.0.3) and earlier versions for Macintosh, and Adobe Acrobat X (10.0.3) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system.

These updates also incorporate the Adobe Flash Player updates as noted in Security Bulletin APSB11-12 and Security Bulletin APSB11-13. The update for Adobe Reader X (10.x) for Windows also incorporate the updates previously addressed in all other supported versions of Adobe Reader and Acrobat as noted in Security Bulletin APSB11-06andSecurity Bulletin APSB11-08.

Adobe recommends users of Adobe Reader X (10.0.3) and earlier versions for Windows and Macintosh update to Adobe Reader X (10.1). For users of Adobe Reader 9.4.4 and earlier versions for Windows and Macintosh, who cannot update to Adobe Reader X (10.1), Adobe has made available updates, Adobe Reader 9.4.5 and Adobe Reader 8.3. Adobe recommends users of Adobe Acrobat X (10.0.3) for Windows and Macintosh update to Adobe Acrobat X (10.1). Adobe recommends users of Adobe Acrobat 9.4.4 and earlier versions for Windows and Macintosh update to Adobe Acrobat 9.4.5, and users of Adobe Acrobat 8.2.6 and earlier versions for Windows and Macintosh update to Adobe Acrobat 8.3.

The next quarterly security updates for Adobe Reader and Acrobat are currently scheduled for September 13, 2011.

Solution(s)

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;