From owner-freebsd-security@FreeBSD.ORG Sun Aug 28 11:27:00 2005 Return-Path: X-Original-To: freebsd-security@FreeBSD.org Delivered-To: freebsd-security@FreeBSD.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id A972016A41F; Sun, 28 Aug 2005 11:27:00 +0000 (GMT) (envelope-from bsam@bsam.ru) Received: from bsam.ru (gw.ipt.ru [80.253.10.66]) by mx1.FreeBSD.org (Postfix) with ESMTP id 310BD43D45; Sun, 28 Aug 2005 11:27:00 +0000 (GMT) (envelope-from bsam@bsam.ru) Received: from bsam by bsam.ru with local (Exim 4.30; FreeBSD) id 1E9LHx-0003SC-8O; Sun, 28 Aug 2005 15:25:25 +0400 To: "Simon L. Nielsen" References: <200508281014.29868.imoore@swiftdsl.com.au> <87188868@srv.sem.ipt.ru> <20050828111317.GC854@zaphod.nitro.dk> From: Boris Samorodov Date: Sun, 28 Aug 2005 15:25:25 +0400 In-Reply-To: <20050828111317.GC854@zaphod.nitro.dk> (Simon L. Nielsen's message of "Sun, 28 Aug 2005 13:13:18 +0200") Message-ID: <21107114@srv.sem.ipt.ru> User-Agent: Gnus/5.11 (Gnus v5.11) Emacs/22.0.50 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: "Boris B. Samorodov" Cc: Ian Moore , freebsd-security@FreeBSD.org, trevor@freebsd.org, secteam@FreeBSD.org Subject: Re: Arcoread7 secutiry vulnerability X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Aug 2005 11:27:00 -0000 On Sun, 28 Aug 2005 13:13:18 +0200 Simon L. Nielsen wrote: > On 2005.08.28 14:56:11 +0400, Boris Samorodov wrote: > > On Sun, 28 Aug 2005 10:14:21 +0930 Ian Moore wrote: > > > > > I've just updated my acroread port to 7.0.1 & was surprised when portaudit > > > still listed it as a vulnerability. > It is, at least based on the information we (Security Team) have. > > I think it is portaudit problem. > > > > > According to http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/85093, the > > > upgrade to 7.0.1 is suppoed to fix the problem, but according to > > > http://www.freebsd.org/ports/portaudit/02bc9b7c-e019-11d9-a8bd-000cf18bbe54.html > > > and Adobe's web site at http://www.adobe.com/support/techdocs/331710.html, > > > the problem exists in 7.0.1 as well, but is fixed in 7.0.2. > > > > > I'm just wondering who is right here, or am I missing something? > > > > It looks like you missed the platfom to pay attention to. For Linux > > and Solaris "users should upgrade to Adobe Reader 7.0.1"... > You are mixing up two different vulnerabilities [1]. The vulnerability > fixed by the 7.0.1 upgrade was "acroread -- plug-in buffer overflow > vulnerability" [2]. The vulnerability portaudit is warning you about > is "acroread -- XML External Entity vulnerability" [3]. As far as I > know Adobe has not released any fix for the Linux version of Adobe > Reader for [3]. > [1] http://www.vuxml.org/freebsd/pkg-acroread7.html > [2] http://www.vuxml.org/freebsd/f74dc01b-0e83-11da-bc08-0001020eed82.html > [3] http://www.vuxml.org/freebsd/02bc9b7c-e019-11d9-a8bd-000cf18bbe54.html Well, I think that Linux version is not suffered from CAN-2005-1306: http://www.adobe.com/support/techdocs/331710.html Platforms affected are Windows and Mac OS. Am I missing something? WBR -- bsam