RHSA-2011_0301

Vulnerability from csaf_redhat - Published: 2011-02-23 21:16 - Updated: 2024-11-14 11:28
Summary
Red Hat Security Advisory: acroread security update
Severity
Critical
Notes
Topic: Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details: Adobe Reader allows users to view and print documents in Portable Document Format (PDF). This update fixes multiple vulnerabilities in Adobe Reader. These vulnerabilities are detailed on the Adobe security page APSB11-03, listed in the References section. A specially-crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2011-0562, CVE-2011-0563, CVE-2011-0565, CVE-2011-0566, CVE-2011-0567, CVE-2011-0585, CVE-2011-0586, CVE-2011-0589, CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, CVE-2011-0594, CVE-2011-0595, CVE-2011-0596, CVE-2011-0598, CVE-2011-0599, CVE-2011-0600, CVE-2011-0602, CVE-2011-0603, CVE-2011-0606) Multiple security flaws were found in Adobe reader. A specially-crafted PDF file could cause cross-site scripting (XSS) attacks against the user running Adobe Reader when opened. (CVE-2011-0587, CVE-2011-0604) All Adobe Reader users should install these updated packages. They contain Adobe Reader version 9.4.2, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Untrusted search path vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2011-0570 and CVE-2011-0588.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0589 and CVE-2011-0606.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Unspecified vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0585.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image, a different vulnerability than CVE-2011-0567 and CVE-2011-0603.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

AcroRd32.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image that triggers an incorrect pointer calculation, leading to heap memory corruption, a different vulnerability than CVE-2011-0566 and CVE-2011-0603.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Unspecified vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0565.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X do not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-0604.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0563 and CVE-2011-0606.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a 3D file, a different vulnerability than CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, CVE-2011-0595, and CVE-2011-0600.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, related to Texture and rgba, a different vulnerability than CVE-2011-0590, CVE-2011-0592, CVE-2011-0593, CVE-2011-0595, and CVE-2011-0600.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, related to "Texture bmp," a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0593, CVE-2011-0595, and CVE-2011-0600.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0595, and CVE-2011-0600.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a font.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, and CVE-2011-0600.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

The Bitmap parsing component in 2d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via an image with crafted (1) height and (2) width values for an RLE_8 compressed bitmap, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-0598, CVE-2011-0599, and CVE-2011-0602.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Integer overflow in ACE.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code via crafted ICC data, a different vulnerability than CVE-2011-0596, CVE-2011-0599, and CVE-2011-0602.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

The Bitmap parsing component in rt3d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted image that causes an invalid pointer calculation related to 4/8-bit RLE compression, a different vulnerability than CVE-2011-0596, CVE-2011-0598, and CVE-2011-0602.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

The U3D component in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a 3D file with an invalid Parent Node count that triggers an incorrect size calculation and memory corruption, a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, and CVE-2011-0595.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via crafted JP2K record types in a JPEG2000 image in a PDF file, which causes heap corruption, a different vulnerability than CVE-2011-0596, CVE-2011-0598, and CVE-2011-0599.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image, a different vulnerability than CVE-2011-0566 and CVE-2011-0567.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-0587.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301

Stack-based buffer overflow in rt3d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to a crafted length value, a different vulnerability than CVE-2011-0563 and CVE-2011-0589.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0301
References
https://access.redhat.com/errata/RHSA-2011:0301 self
https://access.redhat.com/security/updates/classi… external
http://www.adobe.com/support/security/bulletins/a… external
https://bugzilla.redhat.com/show_bug.cgi?id=676157 external
https://bugzilla.redhat.com/show_bug.cgi?id=676158 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2011-0562 self
https://bugzilla.redhat.com/show_bug.cgi?id=676157 external
https://www.cve.org/CVERecord?id=CVE-2011-0562 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0562 external
https://access.redhat.com/security/cve/CVE-2011-0563 self
https://www.cve.org/CVERecord?id=CVE-2011-0563 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0563 external
https://access.redhat.com/security/cve/CVE-2011-0565 self
https://www.cve.org/CVERecord?id=CVE-2011-0565 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0565 external
https://access.redhat.com/security/cve/CVE-2011-0566 self
https://www.cve.org/CVERecord?id=CVE-2011-0566 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0566 external
https://access.redhat.com/security/cve/CVE-2011-0567 self
https://www.cve.org/CVERecord?id=CVE-2011-0567 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0567 external
https://access.redhat.com/security/cve/CVE-2011-0585 self
https://www.cve.org/CVERecord?id=CVE-2011-0585 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0585 external
https://access.redhat.com/security/cve/CVE-2011-0586 self
https://www.cve.org/CVERecord?id=CVE-2011-0586 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0586 external
https://access.redhat.com/security/cve/CVE-2011-0587 self
https://bugzilla.redhat.com/show_bug.cgi?id=676158 external
https://www.cve.org/CVERecord?id=CVE-2011-0587 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0587 external
https://access.redhat.com/security/cve/CVE-2011-0589 self
https://www.cve.org/CVERecord?id=CVE-2011-0589 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0589 external
https://access.redhat.com/security/cve/CVE-2011-0590 self
https://www.cve.org/CVERecord?id=CVE-2011-0590 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0590 external
https://access.redhat.com/security/cve/CVE-2011-0591 self
https://www.cve.org/CVERecord?id=CVE-2011-0591 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0591 external
https://access.redhat.com/security/cve/CVE-2011-0592 self
https://www.cve.org/CVERecord?id=CVE-2011-0592 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0592 external
https://access.redhat.com/security/cve/CVE-2011-0593 self
https://www.cve.org/CVERecord?id=CVE-2011-0593 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0593 external
https://access.redhat.com/security/cve/CVE-2011-0594 self
https://www.cve.org/CVERecord?id=CVE-2011-0594 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0594 external
https://access.redhat.com/security/cve/CVE-2011-0595 self
https://www.cve.org/CVERecord?id=CVE-2011-0595 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0595 external
https://access.redhat.com/security/cve/CVE-2011-0596 self
https://www.cve.org/CVERecord?id=CVE-2011-0596 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0596 external
https://access.redhat.com/security/cve/CVE-2011-0598 self
https://www.cve.org/CVERecord?id=CVE-2011-0598 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0598 external
https://access.redhat.com/security/cve/CVE-2011-0599 self
https://www.cve.org/CVERecord?id=CVE-2011-0599 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0599 external
https://access.redhat.com/security/cve/CVE-2011-0600 self
https://www.cve.org/CVERecord?id=CVE-2011-0600 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0600 external
https://access.redhat.com/security/cve/CVE-2011-0602 self
https://www.cve.org/CVERecord?id=CVE-2011-0602 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0602 external
https://access.redhat.com/security/cve/CVE-2011-0603 self
https://www.cve.org/CVERecord?id=CVE-2011-0603 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0603 external
https://access.redhat.com/security/cve/CVE-2011-0604 self
https://www.cve.org/CVERecord?id=CVE-2011-0604 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0604 external
https://access.redhat.com/security/cve/CVE-2011-0606 self
https://www.cve.org/CVERecord?id=CVE-2011-0606 external
https://nvd.nist.gov/vuln/detail/CVE-2011-0606 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated acroread packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Adobe Reader allows users to view and print documents in Portable Document\nFormat (PDF).\n\nThis update fixes multiple vulnerabilities in Adobe Reader. These\nvulnerabilities are detailed on the Adobe security page APSB11-03, listed\nin the References section.\n\nA specially-crafted PDF file could cause Adobe Reader to crash or,\npotentially, execute arbitrary code as the user running Adobe Reader when\nopened. (CVE-2011-0562, CVE-2011-0563, CVE-2011-0565, CVE-2011-0566,\nCVE-2011-0567, CVE-2011-0585, CVE-2011-0586, CVE-2011-0589, CVE-2011-0590,\nCVE-2011-0591, CVE-2011-0592, CVE-2011-0593, CVE-2011-0594, CVE-2011-0595,\nCVE-2011-0596, CVE-2011-0598, CVE-2011-0599, CVE-2011-0600, CVE-2011-0602,\nCVE-2011-0603, CVE-2011-0606)\n\nMultiple security flaws were found in Adobe reader. A specially-crafted PDF\nfile could cause cross-site scripting (XSS) attacks against the user\nrunning Adobe Reader when opened. (CVE-2011-0587, CVE-2011-0604)\n\nAll Adobe Reader users should install these updated packages. They contain\nAdobe Reader version 9.4.2, which is not vulnerable to these issues. All\nrunning instances of Adobe Reader must be restarted for the update to take\neffect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:0301",
        "url": "https://access.redhat.com/errata/RHSA-2011:0301"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#critical",
        "url": "https://access.redhat.com/security/updates/classification/#critical"
      },
      {
        "category": "external",
        "summary": "http://www.adobe.com/support/security/bulletins/apsb11-03.html",
        "url": "http://www.adobe.com/support/security/bulletins/apsb11-03.html"
      },
      {
        "category": "external",
        "summary": "676157",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
      },
      {
        "category": "external",
        "summary": "676158",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676158"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0301.json"
      }
    ],
    "title": "Red Hat Security Advisory: acroread security update",
    "tracking": {
      "current_release_date": "2024-11-14T11:28:33+00:00",
      "generator": {
        "date": "2024-11-14T11:28:33+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2011:0301",
      "initial_release_date": "2011-02-23T21:16:00+00:00",
      "revision_history": [
        {
          "date": "2011-02-23T21:16:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-02-23T16:17:46+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-14T11:28:33+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4 Extras",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4 Extras",
                  "product_id": "4AS-LACD",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Desktop version 4 Extras",
                "product": {
                  "name": "Red Hat Desktop version 4 Extras",
                  "product_id": "4Desktop-LACD",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4 Extras",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4 Extras",
                  "product_id": "4ES-LACD",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4 Extras",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4 Extras",
                  "product_id": "4WS-LACD",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
                  "product_id": "5Client-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
                  "product_id": "5Server-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:5::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                  "product_id": "6Client-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                  "product_id": "6Server-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                  "product_id": "6Workstation-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux Supplementary"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "acroread-0:9.4.2-1.el4.i386",
                "product": {
                  "name": "acroread-0:9.4.2-1.el4.i386",
                  "product_id": "acroread-0:9.4.2-1.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread@9.4.2-1.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "acroread-plugin-0:9.4.2-1.el4.i386",
                "product": {
                  "name": "acroread-plugin-0:9.4.2-1.el4.i386",
                  "product_id": "acroread-plugin-0:9.4.2-1.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread-plugin@9.4.2-1.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "acroread-0:9.4.2-1.el5.i386",
                "product": {
                  "name": "acroread-0:9.4.2-1.el5.i386",
                  "product_id": "acroread-0:9.4.2-1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread@9.4.2-1.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "acroread-plugin-0:9.4.2-1.el5.i386",
                "product": {
                  "name": "acroread-plugin-0:9.4.2-1.el5.i386",
                  "product_id": "acroread-plugin-0:9.4.2-1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread-plugin@9.4.2-1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "acroread-plugin-0:9.4.2-3.el6_0.i686",
                "product": {
                  "name": "acroread-plugin-0:9.4.2-3.el6_0.i686",
                  "product_id": "acroread-plugin-0:9.4.2-3.el6_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread-plugin@9.4.2-3.el6_0?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "acroread-0:9.4.2-3.el6_0.i686",
                "product": {
                  "name": "acroread-0:9.4.2-3.el6_0.i686",
                  "product_id": "acroread-0:9.4.2-3.el6_0.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread@9.4.2-3.el6_0?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.2-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
          "product_id": "4AS-LACD:acroread-0:9.4.2-1.el4.i386"
        },
        "product_reference": "acroread-0:9.4.2-1.el4.i386",
        "relates_to_product_reference": "4AS-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.2-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
          "product_id": "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.2-1.el4.i386",
        "relates_to_product_reference": "4AS-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.2-1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
          "product_id": "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386"
        },
        "product_reference": "acroread-0:9.4.2-1.el4.i386",
        "relates_to_product_reference": "4Desktop-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.2-1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
          "product_id": "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.2-1.el4.i386",
        "relates_to_product_reference": "4Desktop-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.2-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
          "product_id": "4ES-LACD:acroread-0:9.4.2-1.el4.i386"
        },
        "product_reference": "acroread-0:9.4.2-1.el4.i386",
        "relates_to_product_reference": "4ES-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.2-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
          "product_id": "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.2-1.el4.i386",
        "relates_to_product_reference": "4ES-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.2-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
          "product_id": "4WS-LACD:acroread-0:9.4.2-1.el4.i386"
        },
        "product_reference": "acroread-0:9.4.2-1.el4.i386",
        "relates_to_product_reference": "4WS-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.2-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
          "product_id": "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.2-1.el4.i386",
        "relates_to_product_reference": "4WS-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.2-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
          "product_id": "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386"
        },
        "product_reference": "acroread-0:9.4.2-1.el5.i386",
        "relates_to_product_reference": "5Client-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.2-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
          "product_id": "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.2-1.el5.i386",
        "relates_to_product_reference": "5Client-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.2-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
          "product_id": "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386"
        },
        "product_reference": "acroread-0:9.4.2-1.el5.i386",
        "relates_to_product_reference": "5Server-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.2-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
          "product_id": "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.2-1.el5.i386",
        "relates_to_product_reference": "5Server-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.2-3.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686"
        },
        "product_reference": "acroread-0:9.4.2-3.el6_0.i686",
        "relates_to_product_reference": "6Client-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.2-3.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        },
        "product_reference": "acroread-plugin-0:9.4.2-3.el6_0.i686",
        "relates_to_product_reference": "6Client-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.2-3.el6_0.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686"
        },
        "product_reference": "acroread-0:9.4.2-3.el6_0.i686",
        "relates_to_product_reference": "6Server-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.2-3.el6_0.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        },
        "product_reference": "acroread-plugin-0:9.4.2-3.el6_0.i686",
        "relates_to_product_reference": "6Server-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.2-3.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686"
        },
        "product_reference": "acroread-0:9.4.2-3.el6_0.i686",
        "relates_to_product_reference": "6Workstation-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.2-3.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        },
        "product_reference": "acroread-plugin-0:9.4.2-3.el6_0.i686",
        "relates_to_product_reference": "6Workstation-Supplementary"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2011-0562",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Untrusted search path vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, a different vulnerability than CVE-2011-0570 and CVE-2011-0588.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0562"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0562",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0562"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0562",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0562"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0563",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0589 and CVE-2011-0606.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0563"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0563",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0563"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0563",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0563"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0565",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0585.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0565"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0565",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0565"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0565",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0565"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0566",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image, a different vulnerability than CVE-2011-0567 and CVE-2011-0603.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0566"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0566",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0566"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0566",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0566"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0567",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "AcroRd32.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image that triggers an incorrect pointer calculation, leading to heap memory corruption, a different vulnerability than CVE-2011-0566 and CVE-2011-0603.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0567"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0567",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0567"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0567",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0567"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0585",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Unspecified vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0565.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0585"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0585",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0585"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0585",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0585"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0586",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X do not properly validate unspecified input data, which allows attackers to execute arbitrary code via unknown vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0586"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0586",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0586"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0586",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0586"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0587",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676158"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-0604.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple XSS flaws (APSB11-03)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0587"
        },
        {
          "category": "external",
          "summary": "RHBZ#676158",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676158"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0587",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0587"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0587",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0587"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "acroread: multiple XSS flaws (APSB11-03)"
    },
    {
      "cve": "CVE-2011-0589",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-0563 and CVE-2011-0606.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0589"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0589",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0589"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0589",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0589"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0590",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a 3D file, a different vulnerability than CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, CVE-2011-0595, and CVE-2011-0600.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0590"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0590",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0590"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0590",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0590"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0591",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, related to Texture and rgba, a different vulnerability than CVE-2011-0590, CVE-2011-0592, CVE-2011-0593, CVE-2011-0595, and CVE-2011-0600.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0591"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0591",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0591"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0591",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0591"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0592",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, related to \"Texture bmp,\" a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0593, CVE-2011-0595, and CVE-2011-0600.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0592"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0592",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0592"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0592",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0592"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0593",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0595, and CVE-2011-0600.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0593"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0593",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0593"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0593",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0593"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0594",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a font.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0594"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0594",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0594"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0594",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0594"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0595",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted Universal 3D (U3D) file that triggers a buffer overflow during decompression, a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, and CVE-2011-0600.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0595"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0595",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0595"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0595",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0595"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0596",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Bitmap parsing component in 2d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via an image with crafted (1) height and (2) width values for an RLE_8 compressed bitmap, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2011-0598, CVE-2011-0599, and CVE-2011-0602.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0596"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0596",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0596"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0596",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0596"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0598",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in ACE.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code via crafted ICC data, a different vulnerability than CVE-2011-0596, CVE-2011-0599, and CVE-2011-0602.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0598"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0598",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0598"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0598",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0598"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0599",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The Bitmap parsing component in rt3d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a crafted image that causes an invalid pointer calculation related to 4/8-bit RLE compression, a different vulnerability than CVE-2011-0596, CVE-2011-0598, and CVE-2011-0602.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0599"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0599",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0599"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0599",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0599"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0600",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The U3D component in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via a 3D file with an invalid Parent Node count that triggers an incorrect size calculation and memory corruption, a different vulnerability than CVE-2011-0590, CVE-2011-0591, CVE-2011-0592, CVE-2011-0593, and CVE-2011-0595.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0600"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0600",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0600"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0600",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0600"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0602",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code via crafted JP2K record types in a JPEG2000 image in a PDF file, which causes heap corruption, a different vulnerability than CVE-2011-0596, CVE-2011-0598, and CVE-2011-0599.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0602"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0602",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0602"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0602",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0602"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0603",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image, a different vulnerability than CVE-2011-0566 and CVE-2011-0567.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0603"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0603",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0603"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0603",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0603"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    },
    {
      "cve": "CVE-2011-0604",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676158"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-0587.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple XSS flaws (APSB11-03)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0604"
        },
        {
          "category": "external",
          "summary": "RHBZ#676158",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676158"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0604",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0604"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0604",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0604"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "acroread: multiple XSS flaws (APSB11-03)"
    },
    {
      "cve": "CVE-2011-0606",
      "discovery_date": "2011-02-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "676157"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack-based buffer overflow in rt3d.dll in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before 8.2.6 on Windows and Mac OS X allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors related to a crafted length value, a different vulnerability than CVE-2011-0563 and CVE-2011-0589.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: critical APSB11-03",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-0606"
        },
        {
          "category": "external",
          "summary": "RHBZ#676157",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676157"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0606",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-0606"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0606",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0606"
        }
      ],
      "release_date": "2011-02-08T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-02-23T21:16:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0301"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.2-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.2-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.2-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.2-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.2-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.2-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-0:9.4.2-3.el6_0.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.2-3.el6_0.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: critical APSB11-03"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…