Nuevas Variantes de vulnerabilidades que afectan a Adobe
Posted: 8/9/10 by komz in Etiquetas: adobe acrobat, Adobe Flash Player vulnerability, VulnerabilidadesAdobe Acrobat and Reader (CVE-2010-2208) Remote Code Execution Vulnerability
Adobe Acrobat and Reader Flash Content Parsing Remote Buffer Overflow Vulnerability
Adobe Acrobat and Reader CVE-2010-2211 Remote Memory Corruption Vulnerability
Adobe Acrobat and Reader CVE-2010-2210 Remote Memory Corruption Vulnerability
Adobe Acrobat and Reader 'AcroForm.api' GIF Image Remote Code Execution Vulnerability
Adobe Acrobat and Reader CVE-2010-2209 Remote Memory Corruption Vulnerability
Adobe Acrobat and Reader CVE-2010-2203 Remote Memory Corruption Vulnerability
Adobe Acrobat and Reader CVE-2010-2207 Remote Memory Corruption Vulnerability
Adobe Acrobat and Reader 'pushstring' and 'debugfile' Remote Code Execution Vulnerability
Adobe Acrobat and Reader CLOD Remote Memory Corruption Vulnerability
Adobe Acrobat and Reader CoolType Typography Engine Remote Denial of Service Vulnerability
Adobe Acrobat and Reader 'newfunction' Remote Code Execution Vulnerability
Adobe Acrobat and Reader 'AcroForm.api' Remote Code Execution Vulnerability
Adobe Acrobat and Reader 'newclass' Flash Content Remote Code Execution Vulnerability
Adobe Acrobat and Reader CVE-2010-1295 Remote Memory Corruption Vulnerability
Adobe Acrobat and Reader CVE-2010-0204 Remote Code Execution Vulnerability
Adobe Acrobat and Reader GIF Data Remote Buffer Overflow Vulnerability
Adobe Acrobat and Reader CVE-2010-0197 Remote Code Execution Vulnerability
Adobe Acrobat and Reader BMP Data Remote Buffer Overflow Vulnerability
Adobe Acrobat and Reader JPEG Data Remote Buffer Overflow Vulnerability
Adobe Flash Player, Reader, and Acrobat 'authplay.dll' Remote Code Execution Vulnerability
Adobe Acrobat and Reader CVE-2010-0201 Remote Code Execution Vulnerability
Adobe Acrobat and Reader CVE-2010-1241 'CoolType.dll' Remote Code Execution Vulnerability
Desde Vulnerability Team exortamos a los usuarios y administradores revisar las notificaciones y aplicar las actualizaciones necesarias, para ayudar a mitigar los riesgos.
fuente: securityfocus.com