Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2006:041: acroread

Vulnerability Assessment Details

SUSE-SA:2006:041: acroread

Vulnerability Assessment Summary
Check for the version of the acroread package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2006:041 (acroread).

Various unspecified security problems have been fixed in Acrobat
Reader version 7.0.8.

Adobe does not provide detailed information about the nature of the
security problems. Therefore, it is necessary to assume that remote
code execution is possible.

Adobe does not provide update packages for Acroread that are compatible
with some of our releases from the past. Therefore, updates are missing
(and might not be provided) for the products listed as follows.

As a solution to Adobe acroread security problems on older products
we suggest removal of the package from exposed systems and to use
the longer maintained open source PDF viewers.

- SUSE Linux Enterprise Server 9, Open Enterprise Server,
Novell Linux POS 9

Acrobat Reader 7.0.8 has a new requirement on GTK+ 2.4 libraries
(previously GTK+ 2.2).

Since the above products contain only GTK+ 2.2, the Acrobat Reader
7.0.8 provided by Adobe is currently not functional.

We have postponed the updates and wait for Adobe to clarify this

- SUSE Linux Enterprise Server 8, SUSE Linux Enterprise Desktop 1

These versions only support Acrobat Reader 5 and could not be
upgraded for Acrobat Reader 7 due to glibc and GTK+ requirements.

We discontinued security support for Acrobat Reader on those
products some time ago already.

This issue is tracked by the Mitre CVE ID CVE-2006-3093.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Lenovo N22-20 11.6" Chromebook Intel Celeron 1.60 GHz 4GB RAM, 16G HD
Lenovo N22-20 11.6Lenovo Ideapad S10e 10" Laptop/Notebook w/Intel Atom 1.60GHz 2GB RAM 160GB HDD
Lenovo Ideapad S10e 10HP DL380 G6 - 2xQC 2.66GHZ(X5550) - 12GB RAM- P410i 256MB- 1xPSU/DVD -491505-421
HP DL380 G6 - 2xQC 2.66GHZ(X5550) - 12GB RAM- P410i 256MB- 1xPSU/DVD -491505-421 picture2GB (2 x 1GB) DDR2 533 DIMM PC2 4200 240-Pin CL4 Memory for Desktop Computers
2GB (2 x 1GB) DDR2 533 DIMM PC2 4200 240-Pin CL4 Memory for Desktop Computers picture


No Discussions have been posted on this vulnerability.