-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
National Cyber Awareness System
US-CERT Current Activity
Adobe Releases Security Updates for Adobe Reader and Acrobat
Original release date: February 14, 2013
Last revised: February 21, 2013
Adobe has released a security advisory for Adobe Reader and Acrobat to
address multiple vulnerabilities. Exploitation of these vulnerabilities
may allow an attacker to cause a denial-of-service condition or take
control of the affected system. Adobe is aware of reports that two
vulnerabilities referenced in Security Advisory APSA13-02, CVE-2013-0640
and CVE-2013-0641, are being exploited in the wild.
The advisory indicates that the following versions of Adobe Reader and
Acrobat are affected:
* Adobe Reader XI 11.0.01 and earlier for Windows and Macintosh
* Adobe Reader X 10.1.5 and earlier for Windows and Macintosh
* Adobe Reader 9.5.3 and earlier 9.x versions for Windows, Macintosh,
and Linux
* Adobe Acrobat XI 11.0.01 and earlier for Windows and Macintosh
* Adobe Acrobat X 10.1.5 and earlier for Windows and Macintosh
* Adobe Acrobat 9.5.3. and earlier 9.x versions for Windows and
Macintosh
Adobe recommends users update their product installations to the latest
version using the instructions provided in the "Solutions" section in
Security Bulletin APSB13-07.
Relevant URL(s):
<http://www.adobe.com/support/ security/advisories/apsa13-02. html>
<http://www.adobe.com/support/ security/bulletins/apsb13-07. html>
______________________________ ______________________________ ________
Produced by US-CERT, a government organization.
______________________________ ______________________________ ________
This product is provided subject to this Notification:
http://www.us-cert.gov/ privacy/notification.html
Privacy & Use policy:
http://www.us-cert.gov/ privacy/
This document can also be found at
http://www.us-cert.gov/ current/#adobe_releases_ security_update_for10
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBUSZPL3dnhE8Qi3ZhAQI2BQ f+ MT4P9q1EThcu9S1sfDqYA0bRSZYc1e j3
OppqSfutQh5/ nDBuECOKJjtyAihjnX/ U0bslLcld7FzPgKsSPunHr6Ymw5P2G ozF
6tk/ ezXul9xzrIhZ5vZqilhPDaVKrjHpHV t1phEsJVff+JynW4qrB/OJ3xUYQwDo
9DBASrxYbnUVwBamPXZOV2u7SiLnw+ YdrflCDYjGJbe6jN8v/xGsFVcXJ/ ZNkBMI
0xZbcPr3WvQq+ qMx7tQZUR7HWIVBwHkYXQUUe9fTDAw fdasUIkdG5fr8Tn9EMRcW
jCpFX3cggWcuQ8pKUEspTqN+ kFZd6fWweHSZYTVrw+TZ8+ ZCf7pSVw==
=9GYq
-----END PGP SIGNATURE-----
Hash: SHA1
National Cyber Awareness System
US-CERT Current Activity
Adobe Releases Security Updates for Adobe Reader and Acrobat
Original release date: February 14, 2013
Last revised: February 21, 2013
Adobe has released a security advisory for Adobe Reader and Acrobat to
address multiple vulnerabilities. Exploitation of these vulnerabilities
may allow an attacker to cause a denial-of-service condition or take
control of the affected system. Adobe is aware of reports that two
vulnerabilities referenced in Security Advisory APSA13-02, CVE-2013-0640
and CVE-2013-0641, are being exploited in the wild.
The advisory indicates that the following versions of Adobe Reader and
Acrobat are affected:
* Adobe Reader XI 11.0.01 and earlier for Windows and Macintosh
* Adobe Reader X 10.1.5 and earlier for Windows and Macintosh
* Adobe Reader 9.5.3 and earlier 9.x versions for Windows, Macintosh,
and Linux
* Adobe Acrobat XI 11.0.01 and earlier for Windows and Macintosh
* Adobe Acrobat X 10.1.5 and earlier for Windows and Macintosh
* Adobe Acrobat 9.5.3. and earlier 9.x versions for Windows and
Macintosh
Adobe recommends users update their product installations to the latest
version using the instructions provided in the "Solutions" section in
Security Bulletin APSB13-07.
Relevant URL(s):
<http://www.adobe.com/support/
<http://www.adobe.com/support/
______________________________
Produced by US-CERT, a government organization.
______________________________
This product is provided subject to this Notification:
http://www.us-cert.gov/
Privacy & Use policy:
http://www.us-cert.gov/
This document can also be found at
http://www.us-cert.gov/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBUSZPL3dnhE8Qi3ZhAQI2BQ
OppqSfutQh5/
6tk/
9DBASrxYbnUVwBamPXZOV2u7SiLnw+
0xZbcPr3WvQq+
jCpFX3cggWcuQ8pKUEspTqN+
=9GYq
-----END PGP SIGNATURE-----