{"id":72761,"date":"2010-10-07T06:41:17","date_gmt":"2010-10-07T06:41:17","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72761"},"modified":"2010-10-07T06:41:17","modified_gmt":"2010-10-07T06:41:17","slug":"apsb10-21-security-updates-available-for-adobe-reader-and-acrobat","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/apsb10-21-security-updates-available-for-adobe-reader-and-acrobat\/","title":{"rendered":"APSB10-21 &#8211; Security updates available for Adobe Reader and Acrobat"},"content":{"rendered":"<p>A Critical vulnerabilities have been identified in Adobe Reader 9.3.4 (and earlier versions) for<br \/>\nWindows, Macintosh and UNIX, Adobe Acrobat 9.3.4 (and earlier versions) for Windows and<br \/>\nMacintosh, and Adobe Reader 8.2.4 (and earlier versions) and Adobe Acrobat 8.2.4 (and earlier<br \/>\nversions) for Windows and Macintosh.<\/p>\n<p>These vulnerabilities, including <strong>CVE-2010-2883<\/strong>,referenced in Security Advisory APSA10-02, and <strong>CVE-2010-2884<\/strong> referenced in the Adobe Flash Player Security Bulletin APSB10-22, could cause the application to crash and could potentially allow an attacker to take control of the affected system.There are reports that this vulnerability is being actively exploited in the wild.<\/p>\n<p>We recommends users of Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh<br \/>\nand UNIX update to Adobe Reader 9.4. (For Adobe Reader users on Windows and Macintosh,<br \/>\nwho cannot update to Adobe Reader 9.4, Adobe has provided the Adobe Reader 8.2.5 update.)<br \/>\nAdobe recommends users of Adobe Acrobat 8.2.4 and earlier versions for Windows and Macintosh update to Adobe Acrobat 8.2.5.<\/p>\n<p>This update resolves a font-parsing input validation vulnerability that could lead to code execution (CVE-2010-2883).<\/p>\n<p>This update resolves a memory corruption vulnerability in the authplay.dll component that could lead to code execution (CVE-2010-2884).<\/p>\n<p>For detailed information please go through the below link,<\/p>\n<p><a href=\"https:\/\/www.adobe.com\/support\/security\/bulletins\/apsb10-21.html \">https:\/\/www.adobe.com\/support\/security\/bulletins\/apsb10-21.html <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Critical vulnerabilities have been identified in Adobe Reader 9.3.4 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.4 (and earlier versions) for Windows and Macintosh, and Adobe Reader 8.2.4 (and earlier versions) and Adobe Acrobat 8.2.4 (and earlier versions) for Windows and Macintosh. These vulnerabilities, including CVE-2010-2883,referenced in Security Advisory APSA10-02, and [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-72761","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72761"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72761"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72761\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}