RHSA-2011_1434

Vulnerability from csaf_redhat - Published: 2011-11-08 11:13 - Updated: 2024-11-14 11:30
Summary
Red Hat Security Advisory: acroread security update
Severity
Critical
Notes
Topic: Updated acroread packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details: Adobe Reader allows users to view and print documents in Portable Document Format (PDF). This update fixes multiple security flaws in Adobe Reader. These flaws are detailed on the Adobe security page APSB11-24, listed in the References section. A specially-crafted PDF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2011-2431, CVE-2011-2432, CVE-2011-2433, CVE-2011-2434, CVE-2011-2435, CVE-2011-2436, CVE-2011-2437, CVE-2011-2438, CVE-2011-2439, CVE-2011-2440, CVE-2011-2442) This update also fixes multiple security flaws in Adobe Flash Player embedded in Adobe Reader. These flaws are detailed on the Adobe security pages APSB11-21 and APSB11-26, listed in the References section. A PDF file with an embedded, specially-crafted SWF file could cause Adobe Reader to crash or, potentially, execute arbitrary code as the user running Adobe Reader when opened. (CVE-2011-2130, CVE-2011-2134, CVE-2011-2135, CVE-2011-2136, CVE-2011-2137, CVE-2011-2138, CVE-2011-2139, CVE-2011-2140, CVE-2011-2414, CVE-2011-2415, CVE-2011-2416, CVE-2011-2417, CVE-2011-2424, CVE-2011-2425, CVE-2011-2426, CVE-2011-2427, CVE-2011-2428, CVE-2011-2430) A flaw in Adobe Flash Player could allow an attacker to conduct cross-site scripting (XSS) attacks if a victim were tricked into visiting a specially-crafted web page. (CVE-2011-2444) This update also fixes an information disclosure flaw in Adobe Flash Player. (CVE-2011-2429) All Adobe Reader users should install these updated packages. They contain Adobe Reader version 9.4.6, which is not vulnerable to these issues. All running instances of Adobe Reader must be restarted for the update to take effect.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2095 and CVE-2011-2097.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2094 and CVE-2011-2097.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2094 and CVE-2011-2095.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2098.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X do not properly restrict script, which allows attackers to execute arbitrary code via a crafted document, related to a "cross document script execution vulnerability."

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted font data.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.22 and earlier on Android, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to a "universal cross-site scripting vulnerability."

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2134, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2140, CVE-2011-2417, and CVE-2011-2425.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2138 and CVE-2011-2416.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2414, and CVE-2011-2415.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2416.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2415.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2414.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2138.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2425.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted SWF file, as demonstrated by "about 400 unique crash signatures."

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2417.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to execute arbitrary code via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to execute arbitrary code or cause a denial of service via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to execute arbitrary code or cause a denial of service (browser crash) via unspecified vectors, related to a "logic error issue."

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, related to a "security control bypass."

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to execute arbitrary code via crafted streaming media, related to a "logic error vulnerability."

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "security bypass vulnerability."

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Buffer overflow in the U3D TIFF Resource in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2434 and CVE-2011-2437.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2433 and CVE-2011-2437.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Heap-based buffer overflow in the image-parsing library in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2433 and CVE-2011-2434.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Multiple stack-based buffer overflows in the image-parsing library in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "memory leakage condition vulnerability."

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Use-after-free vulnerability in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a "logic error vulnerability."

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to inject arbitrary web script or HTML via a crafted URL, related to a "universal cross-site scripting issue," as exploited in the wild in September 2011.

CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434

Integer overflow in Adobe Reader 9.x before 9.4.6 on Linux allows attackers to execute arbitrary code via unspecified vectors.

Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:1434
References
https://access.redhat.com/errata/RHSA-2011:1434 self
https://access.redhat.com/security/updates/classi… external
http://www.adobe.com/support/security/bulletins/a… external
http://www.adobe.com/support/security/bulletins/a… external
http://www.adobe.com/support/security/bulletins/a… external
https://bugzilla.redhat.com/show_bug.cgi?id=729497 external
https://bugzilla.redhat.com/show_bug.cgi?id=740201 external
https://bugzilla.redhat.com/show_bug.cgi?id=740204 external
https://bugzilla.redhat.com/show_bug.cgi?id=740388 external
https://bugzilla.redhat.com/show_bug.cgi?id=749381 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2011-2094 self
https://bugzilla.redhat.com/show_bug.cgi?id=720622 external
https://www.cve.org/CVERecord?id=CVE-2011-2094 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2094 external
https://access.redhat.com/security/cve/CVE-2011-2095 self
https://www.cve.org/CVERecord?id=CVE-2011-2095 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2095 external
https://access.redhat.com/security/cve/CVE-2011-2096 self
https://www.cve.org/CVERecord?id=CVE-2011-2096 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2096 external
https://access.redhat.com/security/cve/CVE-2011-2097 self
https://www.cve.org/CVERecord?id=CVE-2011-2097 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2097 external
https://access.redhat.com/security/cve/CVE-2011-2098 self
https://www.cve.org/CVERecord?id=CVE-2011-2098 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2098 external
https://access.redhat.com/security/cve/CVE-2011-2099 self
https://www.cve.org/CVERecord?id=CVE-2011-2099 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2099 external
https://access.redhat.com/security/cve/CVE-2011-2101 self
https://www.cve.org/CVERecord?id=CVE-2011-2101 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2101 external
https://access.redhat.com/security/cve/CVE-2011-2104 self
https://bugzilla.redhat.com/show_bug.cgi?id=720633 external
https://www.cve.org/CVERecord?id=CVE-2011-2104 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2104 external
https://access.redhat.com/security/cve/CVE-2011-2105 self
https://www.cve.org/CVERecord?id=CVE-2011-2105 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2105 external
https://access.redhat.com/security/cve/CVE-2011-2107 self
https://bugzilla.redhat.com/show_bug.cgi?id=710981 external
https://www.cve.org/CVERecord?id=CVE-2011-2107 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2107 external
https://access.redhat.com/security/cve/CVE-2011-2130 self
https://bugzilla.redhat.com/show_bug.cgi?id=729497 external
https://www.cve.org/CVERecord?id=CVE-2011-2130 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2130 external
http://www.adobe.com/support/security/bulletins/a… external
https://access.redhat.com/security/cve/CVE-2011-2134 self
https://www.cve.org/CVERecord?id=CVE-2011-2134 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2134 external
https://access.redhat.com/security/cve/CVE-2011-2135 self
https://www.cve.org/CVERecord?id=CVE-2011-2135 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2135 external
https://access.redhat.com/security/cve/CVE-2011-2136 self
https://www.cve.org/CVERecord?id=CVE-2011-2136 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2136 external
https://access.redhat.com/security/cve/CVE-2011-2137 self
https://www.cve.org/CVERecord?id=CVE-2011-2137 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2137 external
https://access.redhat.com/security/cve/CVE-2011-2138 self
https://www.cve.org/CVERecord?id=CVE-2011-2138 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2138 external
https://access.redhat.com/security/cve/CVE-2011-2139 self
https://www.cve.org/CVERecord?id=CVE-2011-2139 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2139 external
https://access.redhat.com/security/cve/CVE-2011-2140 self
https://www.cve.org/CVERecord?id=CVE-2011-2140 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2140 external
https://access.redhat.com/security/cve/CVE-2011-2414 self
https://www.cve.org/CVERecord?id=CVE-2011-2414 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2414 external
https://access.redhat.com/security/cve/CVE-2011-2415 self
https://www.cve.org/CVERecord?id=CVE-2011-2415 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2415 external
https://access.redhat.com/security/cve/CVE-2011-2416 self
https://www.cve.org/CVERecord?id=CVE-2011-2416 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2416 external
https://access.redhat.com/security/cve/CVE-2011-2417 self
https://www.cve.org/CVERecord?id=CVE-2011-2417 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2417 external
https://access.redhat.com/security/cve/CVE-2011-2424 self
https://www.cve.org/CVERecord?id=CVE-2011-2424 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2424 external
https://access.redhat.com/security/cve/CVE-2011-2425 self
https://www.cve.org/CVERecord?id=CVE-2011-2425 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2425 external
https://access.redhat.com/security/cve/CVE-2011-2426 self
https://bugzilla.redhat.com/show_bug.cgi?id=740388 external
https://www.cve.org/CVERecord?id=CVE-2011-2426 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2426 external
https://access.redhat.com/security/cve/CVE-2011-2427 self
https://www.cve.org/CVERecord?id=CVE-2011-2427 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2427 external
https://access.redhat.com/security/cve/CVE-2011-2428 self
https://www.cve.org/CVERecord?id=CVE-2011-2428 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2428 external
https://access.redhat.com/security/cve/CVE-2011-2429 self
https://bugzilla.redhat.com/show_bug.cgi?id=740204 external
https://www.cve.org/CVERecord?id=CVE-2011-2429 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2429 external
https://access.redhat.com/security/cve/CVE-2011-2430 self
https://www.cve.org/CVERecord?id=CVE-2011-2430 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2430 external
https://access.redhat.com/security/cve/CVE-2011-2431 self
https://bugzilla.redhat.com/show_bug.cgi?id=749381 external
https://www.cve.org/CVERecord?id=CVE-2011-2431 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2431 external
https://access.redhat.com/security/cve/CVE-2011-2432 self
https://www.cve.org/CVERecord?id=CVE-2011-2432 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2432 external
https://access.redhat.com/security/cve/CVE-2011-2433 self
https://www.cve.org/CVERecord?id=CVE-2011-2433 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2433 external
https://access.redhat.com/security/cve/CVE-2011-2434 self
https://www.cve.org/CVERecord?id=CVE-2011-2434 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2434 external
https://access.redhat.com/security/cve/CVE-2011-2435 self
https://www.cve.org/CVERecord?id=CVE-2011-2435 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2435 external
https://access.redhat.com/security/cve/CVE-2011-2436 self
https://www.cve.org/CVERecord?id=CVE-2011-2436 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2436 external
https://access.redhat.com/security/cve/CVE-2011-2437 self
https://www.cve.org/CVERecord?id=CVE-2011-2437 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2437 external
https://access.redhat.com/security/cve/CVE-2011-2438 self
https://www.cve.org/CVERecord?id=CVE-2011-2438 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2438 external
https://access.redhat.com/security/cve/CVE-2011-2439 self
https://www.cve.org/CVERecord?id=CVE-2011-2439 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2439 external
https://access.redhat.com/security/cve/CVE-2011-2440 self
https://www.cve.org/CVERecord?id=CVE-2011-2440 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2440 external
https://access.redhat.com/security/cve/CVE-2011-2442 self
https://www.cve.org/CVERecord?id=CVE-2011-2442 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2442 external
https://access.redhat.com/security/cve/CVE-2011-2444 self
https://bugzilla.redhat.com/show_bug.cgi?id=740201 external
https://www.cve.org/CVERecord?id=CVE-2011-2444 external
https://nvd.nist.gov/vuln/detail/CVE-2011-2444 external
https://access.redhat.com/security/cve/CVE-2011-4374 self
https://www.cve.org/CVERecord?id=CVE-2011-4374 external
https://nvd.nist.gov/vuln/detail/CVE-2011-4374 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated acroread packages that fix multiple security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Adobe Reader allows users to view and print documents in Portable Document\nFormat (PDF).\n\nThis update fixes multiple security flaws in Adobe Reader. These flaws are\ndetailed on the Adobe security page APSB11-24, listed in the References\nsection. A specially-crafted PDF file could cause Adobe Reader to crash or,\npotentially, execute arbitrary code as the user running Adobe Reader when\nopened. (CVE-2011-2431, CVE-2011-2432, CVE-2011-2433, CVE-2011-2434,\nCVE-2011-2435, CVE-2011-2436, CVE-2011-2437, CVE-2011-2438, CVE-2011-2439,\nCVE-2011-2440, CVE-2011-2442)\n\nThis update also fixes multiple security flaws in Adobe Flash Player\nembedded in Adobe Reader. These flaws are detailed on the Adobe security\npages APSB11-21 and APSB11-26, listed in the References section.\n\nA PDF file with an embedded, specially-crafted SWF file could cause Adobe\nReader to crash or, potentially, execute arbitrary code as the user running\nAdobe Reader when opened. (CVE-2011-2130, CVE-2011-2134, CVE-2011-2135,\nCVE-2011-2136, CVE-2011-2137, CVE-2011-2138, CVE-2011-2139, CVE-2011-2140,\nCVE-2011-2414, CVE-2011-2415, CVE-2011-2416, CVE-2011-2417, CVE-2011-2424,\nCVE-2011-2425, CVE-2011-2426, CVE-2011-2427, CVE-2011-2428, CVE-2011-2430)\n\nA flaw in Adobe Flash Player could allow an attacker to conduct cross-site\nscripting (XSS) attacks if a victim were tricked into visiting a\nspecially-crafted web page. (CVE-2011-2444)\n\nThis update also fixes an information disclosure flaw in Adobe Flash\nPlayer. (CVE-2011-2429)\n\nAll Adobe Reader users should install these updated packages. They contain\nAdobe Reader version 9.4.6, which is not vulnerable to these issues. All\nrunning instances of Adobe Reader must be restarted for the update to take\neffect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:1434",
        "url": "https://access.redhat.com/errata/RHSA-2011:1434"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#critical",
        "url": "https://access.redhat.com/security/updates/classification/#critical"
      },
      {
        "category": "external",
        "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
        "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
      },
      {
        "category": "external",
        "summary": "http://www.adobe.com/support/security/bulletins/apsb11-24.html",
        "url": "http://www.adobe.com/support/security/bulletins/apsb11-24.html"
      },
      {
        "category": "external",
        "summary": "http://www.adobe.com/support/security/bulletins/apsb11-26.html",
        "url": "http://www.adobe.com/support/security/bulletins/apsb11-26.html"
      },
      {
        "category": "external",
        "summary": "729497",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
      },
      {
        "category": "external",
        "summary": "740201",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740201"
      },
      {
        "category": "external",
        "summary": "740204",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740204"
      },
      {
        "category": "external",
        "summary": "740388",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740388"
      },
      {
        "category": "external",
        "summary": "749381",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1434.json"
      }
    ],
    "title": "Red Hat Security Advisory: acroread security update",
    "tracking": {
      "current_release_date": "2024-11-14T11:30:25+00:00",
      "generator": {
        "date": "2024-11-14T11:30:25+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.0"
        }
      },
      "id": "RHSA-2011:1434",
      "initial_release_date": "2011-11-08T11:13:00+00:00",
      "revision_history": [
        {
          "date": "2011-11-08T11:13:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-11-08T11:13:47+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-14T11:30:25+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AS version 4 Extras",
                "product": {
                  "name": "Red Hat Enterprise Linux AS version 4 Extras",
                  "product_id": "4AS-LACD",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Desktop version 4 Extras",
                "product": {
                  "name": "Red Hat Desktop version 4 Extras",
                  "product_id": "4Desktop-LACD",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ES version 4 Extras",
                "product": {
                  "name": "Red Hat Enterprise Linux ES version 4 Extras",
                  "product_id": "4ES-LACD",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux WS version 4 Extras",
                "product": {
                  "name": "Red Hat Enterprise Linux WS version 4 Extras",
                  "product_id": "4WS-LACD",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
                  "product_id": "5Client-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:5::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
                  "product_id": "5Server-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:5::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
                  "product_id": "6Client-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)",
                  "product_id": "6Server-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
                  "product_id": "6Workstation-Supplementary",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_extras:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux Supplementary"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "acroread-plugin-0:9.4.6-1.el4.i386",
                "product": {
                  "name": "acroread-plugin-0:9.4.6-1.el4.i386",
                  "product_id": "acroread-plugin-0:9.4.6-1.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread-plugin@9.4.6-1.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "acroread-0:9.4.6-1.el4.i386",
                "product": {
                  "name": "acroread-0:9.4.6-1.el4.i386",
                  "product_id": "acroread-0:9.4.6-1.el4.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread@9.4.6-1.el4?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "acroread-plugin-0:9.4.6-1.el5.i386",
                "product": {
                  "name": "acroread-plugin-0:9.4.6-1.el5.i386",
                  "product_id": "acroread-plugin-0:9.4.6-1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread-plugin@9.4.6-1.el5?arch=i386"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "acroread-0:9.4.6-1.el5.i386",
                "product": {
                  "name": "acroread-0:9.4.6-1.el5.i386",
                  "product_id": "acroread-0:9.4.6-1.el5.i386",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread@9.4.6-1.el5?arch=i386"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i386"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "acroread-0:9.4.6-1.el6.i686",
                "product": {
                  "name": "acroread-0:9.4.6-1.el6.i686",
                  "product_id": "acroread-0:9.4.6-1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread@9.4.6-1.el6?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "acroread-plugin-0:9.4.6-1.el6.i686",
                "product": {
                  "name": "acroread-plugin-0:9.4.6-1.el6.i686",
                  "product_id": "acroread-plugin-0:9.4.6-1.el6.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/acroread-plugin@9.4.6-1.el6?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.6-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
          "product_id": "4AS-LACD:acroread-0:9.4.6-1.el4.i386"
        },
        "product_reference": "acroread-0:9.4.6-1.el4.i386",
        "relates_to_product_reference": "4AS-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.6-1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
          "product_id": "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.6-1.el4.i386",
        "relates_to_product_reference": "4AS-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.6-1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
          "product_id": "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386"
        },
        "product_reference": "acroread-0:9.4.6-1.el4.i386",
        "relates_to_product_reference": "4Desktop-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.6-1.el4.i386 as a component of Red Hat Desktop version 4 Extras",
          "product_id": "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.6-1.el4.i386",
        "relates_to_product_reference": "4Desktop-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.6-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
          "product_id": "4ES-LACD:acroread-0:9.4.6-1.el4.i386"
        },
        "product_reference": "acroread-0:9.4.6-1.el4.i386",
        "relates_to_product_reference": "4ES-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.6-1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
          "product_id": "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.6-1.el4.i386",
        "relates_to_product_reference": "4ES-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.6-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
          "product_id": "4WS-LACD:acroread-0:9.4.6-1.el4.i386"
        },
        "product_reference": "acroread-0:9.4.6-1.el4.i386",
        "relates_to_product_reference": "4WS-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.6-1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
          "product_id": "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.6-1.el4.i386",
        "relates_to_product_reference": "4WS-LACD"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.6-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
          "product_id": "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386"
        },
        "product_reference": "acroread-0:9.4.6-1.el5.i386",
        "relates_to_product_reference": "5Client-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.6-1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
          "product_id": "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.6-1.el5.i386",
        "relates_to_product_reference": "5Client-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.6-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
          "product_id": "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386"
        },
        "product_reference": "acroread-0:9.4.6-1.el5.i386",
        "relates_to_product_reference": "5Server-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.6-1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
          "product_id": "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386"
        },
        "product_reference": "acroread-plugin-0:9.4.6-1.el5.i386",
        "relates_to_product_reference": "5Server-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.6-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686"
        },
        "product_reference": "acroread-0:9.4.6-1.el6.i686",
        "relates_to_product_reference": "6Client-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.6-1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)",
          "product_id": "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        },
        "product_reference": "acroread-plugin-0:9.4.6-1.el6.i686",
        "relates_to_product_reference": "6Client-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.6-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686"
        },
        "product_reference": "acroread-0:9.4.6-1.el6.i686",
        "relates_to_product_reference": "6Server-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.6-1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)",
          "product_id": "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        },
        "product_reference": "acroread-plugin-0:9.4.6-1.el6.i686",
        "relates_to_product_reference": "6Server-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-0:9.4.6-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686"
        },
        "product_reference": "acroread-0:9.4.6-1.el6.i686",
        "relates_to_product_reference": "6Workstation-Supplementary"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "acroread-plugin-0:9.4.6-1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)",
          "product_id": "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        },
        "product_reference": "acroread-plugin-0:9.4.6-1.el6.i686",
        "relates_to_product_reference": "6Workstation-Supplementary"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2011-2094",
      "discovery_date": "2011-06-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "720622"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2095 and CVE-2011-2097.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-16)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2094"
        },
        {
          "category": "external",
          "summary": "RHBZ#720622",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720622"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2094",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2094"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2094",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2094"
        }
      ],
      "release_date": "2011-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-16)"
    },
    {
      "cve": "CVE-2011-2095",
      "discovery_date": "2011-06-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "720622"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2094 and CVE-2011-2097.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-16)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2095"
        },
        {
          "category": "external",
          "summary": "RHBZ#720622",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720622"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2095",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2095"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2095",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2095"
        }
      ],
      "release_date": "2011-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-16)"
    },
    {
      "cve": "CVE-2011-2096",
      "discovery_date": "2011-06-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "720622"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-16)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2096"
        },
        {
          "category": "external",
          "summary": "RHBZ#720622",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720622"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2096",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2096"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2096",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2096"
        }
      ],
      "release_date": "2011-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-16)"
    },
    {
      "cve": "CVE-2011-2097",
      "discovery_date": "2011-06-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "720622"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2094 and CVE-2011-2095.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-16)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2097"
        },
        {
          "category": "external",
          "summary": "RHBZ#720622",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720622"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2097",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2097"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2097",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2097"
        }
      ],
      "release_date": "2011-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-16)"
    },
    {
      "cve": "CVE-2011-2098",
      "discovery_date": "2011-06-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "720622"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2099.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-16)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2098"
        },
        {
          "category": "external",
          "summary": "RHBZ#720622",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720622"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2098",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2098"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2098",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2098"
        }
      ],
      "release_date": "2011-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-16)"
    },
    {
      "cve": "CVE-2011-2099",
      "discovery_date": "2011-06-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "720622"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2098.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-16)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2099"
        },
        {
          "category": "external",
          "summary": "RHBZ#720622",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720622"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2099",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2099"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2099",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2099"
        }
      ],
      "release_date": "2011-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-16)"
    },
    {
      "cve": "CVE-2011-2101",
      "discovery_date": "2011-06-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "720622"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X do not properly restrict script, which allows attackers to execute arbitrary code via a crafted document, related to a \"cross document script execution vulnerability.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-16)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2101"
        },
        {
          "category": "external",
          "summary": "RHBZ#720622",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720622"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2101",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2101"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2101",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2101"
        }
      ],
      "release_date": "2011-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-16)"
    },
    {
      "cve": "CVE-2011-2104",
      "discovery_date": "2011-06-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "720633"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to cause a denial of service (memory corruption) via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: Multiple denial of service flaws (APSB11-16)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2104"
        },
        {
          "category": "external",
          "summary": "RHBZ#720633",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720633"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2104",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2104"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2104",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2104"
        }
      ],
      "release_date": "2011-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "acroread: Multiple denial of service flaws (APSB11-16)"
    },
    {
      "cve": "CVE-2011-2105",
      "discovery_date": "2011-06-14T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "720633"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 8.x before 8.3, 9.x before 9.4.5, and 10.x before 10.1 on Windows and Mac OS X allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted font data.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: Multiple denial of service flaws (APSB11-16)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2105"
        },
        {
          "category": "external",
          "summary": "RHBZ#720633",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=720633"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2105",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2105"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2105",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2105"
        }
      ],
      "release_date": "2011-06-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "acroread: Multiple denial of service flaws (APSB11-16)"
    },
    {
      "cve": "CVE-2011-2107",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2011-06-05T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "710981"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.181.22 on Windows, Mac OS X, Linux, and Solaris, and 10.3.185.22 and earlier on Android, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to a \"universal cross-site scripting vulnerability.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: Cross-site scripting vulnerability (APSB11-13)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2107"
        },
        {
          "category": "external",
          "summary": "RHBZ#710981",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=710981"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2107",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2107"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2107",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2107"
        }
      ],
      "release_date": "2011-06-05T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "flash-plugin: Cross-site scripting vulnerability (APSB11-13)"
    },
    {
      "cve": "CVE-2011-2130",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2134, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2130"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2130",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2130"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2130",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2130"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2134",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2137, CVE-2011-2414, and CVE-2011-2415.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2134"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2134",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2134"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2134",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2134"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2135",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2140, CVE-2011-2417, and CVE-2011-2425.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2135"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2135",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2135"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2135",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2135"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2136",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2138 and CVE-2011-2416.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2136"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2136",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2136"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2136",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2136"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2137",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2414, and CVE-2011-2415.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2137"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2137",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2137"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2137",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2137"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2138",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2416.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2138"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2138",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2138"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2138",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2138"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2139",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2139"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2139",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2139"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2139",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2139"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2140",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2417, and CVE-2011-2425.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2140"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2140",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2140"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2140",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2140"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2414",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2415.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2414"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2414",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2414"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2414",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2414"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2415",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2130, CVE-2011-2134, CVE-2011-2137, and CVE-2011-2414.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2415"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2415",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2415"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2415",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2415"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2416",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2136 and CVE-2011-2138.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2416"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2416",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2416"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2416",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2416"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2417",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2425.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2417"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2417",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2417"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2417",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2417"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2424",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted SWF file, as demonstrated by \"about 400 unique crash signatures.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2424"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2424",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2424"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2424",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2424"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2425",
      "discovery_date": "2011-08-09T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "729497"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2417.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2425"
        },
        {
          "category": "external",
          "summary": "RHBZ#729497",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729497"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2425",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2425"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2425",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2425"
        },
        {
          "category": "external",
          "summary": "http://www.adobe.com/support/security/bulletins/apsb11-21.html",
          "url": "http://www.adobe.com/support/security/bulletins/apsb11-21.html"
        }
      ],
      "release_date": "2011-08-09T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: multiple arbitrary code execution flaws (APSB-11-21)"
    },
    {
      "cve": "CVE-2011-2426",
      "discovery_date": "2011-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "740388"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to execute arbitrary code via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: critical flaws fixed in APSB11-26",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2426"
        },
        {
          "category": "external",
          "summary": "RHBZ#740388",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740388"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2426",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2426"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2426",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2426"
        }
      ],
      "release_date": "2011-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: critical flaws fixed in APSB11-26"
    },
    {
      "cve": "CVE-2011-2427",
      "discovery_date": "2011-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "740388"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to execute arbitrary code or cause a denial of service via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: critical flaws fixed in APSB11-26",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2427"
        },
        {
          "category": "external",
          "summary": "RHBZ#740388",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740388"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2427",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2427"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2427",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2427"
        }
      ],
      "release_date": "2011-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: critical flaws fixed in APSB11-26"
    },
    {
      "cve": "CVE-2011-2428",
      "discovery_date": "2011-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "740388"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to execute arbitrary code or cause a denial of service (browser crash) via unspecified vectors, related to a \"logic error issue.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: critical flaws fixed in APSB11-26",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2428"
        },
        {
          "category": "external",
          "summary": "RHBZ#740388",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740388"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2428",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2428"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2428",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2428"
        }
      ],
      "release_date": "2011-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: critical flaws fixed in APSB11-26"
    },
    {
      "cve": "CVE-2011-2429",
      "discovery_date": "2011-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "740204"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, related to a \"security control bypass.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: security control bypass information disclosure fixed in APSB11-26",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2429"
        },
        {
          "category": "external",
          "summary": "RHBZ#740204",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740204"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2429",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2429"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2429",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2429"
        }
      ],
      "release_date": "2011-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "flash-plugin: security control bypass information disclosure fixed in APSB11-26"
    },
    {
      "cve": "CVE-2011-2430",
      "discovery_date": "2011-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "740388"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to execute arbitrary code via crafted streaming media, related to a \"logic error vulnerability.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: critical flaws fixed in APSB11-26",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2430"
        },
        {
          "category": "external",
          "summary": "RHBZ#740388",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740388"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2430",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2430"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2430",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2430"
        }
      ],
      "release_date": "2011-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "flash-plugin: critical flaws fixed in APSB11-26"
    },
    {
      "cve": "CVE-2011-2431",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a \"security bypass vulnerability.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2431"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2431",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2431"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2431",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2431"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2432",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in the U3D TIFF Resource in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2432"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2432",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2432"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2432",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2432"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2433",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2434 and CVE-2011-2437.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2433"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2433",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2433"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2433",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2433"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2434",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2433 and CVE-2011-2437.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2434"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2434",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2434"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2434",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2434"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2435",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2435"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2435",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2435"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2435",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2435"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2436",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Heap-based buffer overflow in the image-parsing library in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2436"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2436",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2436"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2436",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2436"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2437",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Heap-based buffer overflow in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2011-2433 and CVE-2011-2434.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2437"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2437",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2437"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2437",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2437"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2438",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple stack-based buffer overflows in the image-parsing library in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2438"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2438",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2438"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2438",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2438"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2439",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a \"memory leakage condition vulnerability.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2439"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2439",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2439"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2439",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2439"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2440",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Use-after-free vulnerability in Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allows attackers to execute arbitrary code via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2440"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2440",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2440"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2440",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2440"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2442",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Adobe Reader and Acrobat 8.x before 8.3.1, 9.x before 9.4.6, and 10.x before 10.1.1 allow attackers to execute arbitrary code via unspecified vectors, related to a \"logic error vulnerability.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2442"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2442",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2442"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2442",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2442"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    },
    {
      "cve": "CVE-2011-2444",
      "cwe": {
        "id": "CWE-79",
        "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
      },
      "discovery_date": "2011-09-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "740201"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.10 on Windows, Mac OS X, Linux, and Solaris, and before 10.3.186.7 on Android, allows remote attackers to inject arbitrary web script or HTML via a crafted URL, related to a \"universal cross-site scripting issue,\" as exploited in the wild in September 2011.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "flash-plugin: Cross-site scripting vulnerability fixed in APSB11-26",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-2444"
        },
        {
          "category": "external",
          "summary": "RHBZ#740201",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740201"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2444",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-2444"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2444",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2444"
        }
      ],
      "release_date": "2011-09-21T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "flash-plugin: Cross-site scripting vulnerability fixed in APSB11-26"
    },
    {
      "cve": "CVE-2011-4374",
      "discovery_date": "2011-09-13T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "749381"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Integer overflow in Adobe Reader 9.x before 9.4.6 on Linux allows attackers to execute arbitrary code via unspecified vectors.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "acroread: multiple code execution flaws (APSB11-24)",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
          "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
          "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
          "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
          "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
          "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
          "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
          "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-4374"
        },
        {
          "category": "external",
          "summary": "RHBZ#749381",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749381"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4374",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-4374"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4374",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4374"
        }
      ],
      "release_date": "2011-09-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-11-08T11:13:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:1434"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "4AS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4AS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-0:9.4.6-1.el4.i386",
            "4Desktop-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-0:9.4.6-1.el4.i386",
            "4ES-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-0:9.4.6-1.el4.i386",
            "4WS-LACD:acroread-plugin-0:9.4.6-1.el4.i386",
            "5Client-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Client-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-0:9.4.6-1.el5.i386",
            "5Server-Supplementary:acroread-plugin-0:9.4.6-1.el5.i386",
            "6Client-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Client-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Server-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-0:9.4.6-1.el6.i686",
            "6Workstation-Supplementary:acroread-plugin-0:9.4.6-1.el6.i686"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Critical"
        }
      ],
      "title": "acroread: multiple code execution flaws (APSB11-24)"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…