Adobe has released security updates for Adobe Reader and Acrobat XI (11.0.06) and earlier versions for Windows and Macintosh. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.
Adobe recommends users update their product installations to the latest versions:
- Users of Adobe Reader XI (11.0.06) for Windows and Macintosh should update to Adobe Reader XI (11.0.07).
- For users of Adobe Reader X (10.1.9) and earlier versions for Windows and Macintosh, who cannot update to Adobe Reader XI (11.0.07), Adobe has made available the update Adobe Reader X (10.1.10).
- Users of Adobe Acrobat XI (11.0.06) for Windows and Macintosh should update to Adobe Acrobat XI (11.0.07).
- For users of Adobe Acrobat X (10.1.9) and earlier versions for Windows and Macintosh, who cannot update to Adobe Acrobat XI (11.0.07), Adobe has made available the update Adobe Acrobat X (10.1.10).
These updates resolve a heap overflow vulnerability that could lead to code execution (CVE-2014-0511).
These updates resolve an input validation error that could lead to a security bypass (CVE-2014-0512).
These updates resolve a vulnerability in the implementation of Javascript APIs that could lead to information disclosure (CVE-2014-0521).
These updates resolve memory corruption vulnerabilities that could lead to code execution (CVE-2014-0522, CVE-2014-0523, CVE-2014-0524, CVE-2014-0526).
These updates resolve a vulnerability in the way Reader handles certain API calls to unmapped memory that could lead to code execution (CVE-2014-0525).
These updates resolve a use-after-free vulnerability that could lead to code execution (CVE-2014-0527).
These updates resolve a double-free vulnerability that could lead to code execution (CVE-2014-0528).
These updates resolve a buffer overflow vulnerability that could lead to code execution (CVE-2014-0529).