Note: This is an archival copy of Security Sun Alert 265330 as previously published on
Latest version of this security advisory is available from as Sun Alert 1020816.1.
Article ID : 1020816.1
Article Type : Sun Alerts (SURE)
Last reviewed : 2009-08-31
Audience : PUBLIC
Copyright Notice: Copyright © 2010, Oracle Corporation and/or its affiliates.

Multiple Security Vulnerabilities in Adobe Reader for Solaris 10 May Allow Execution of Arbitrary Code or Cause Denial of Service (DoS) (Adobe Security Bulletin APSB09-07)


Release Phase

Bug Id

Solaris 10 Operating System

Date of Workaround Release

Date of Resolved Release

Multiple security vulnerabilities in Adobe Reader and Acrobat:

1. Impact

Multiple security vulnerabilities in Adobe Reader and Acrobat versions prior to 9.1.2, 8.1.6, and 7.1.3 may allow a remote unprivileged user to execute arbitrary code with the privileges of the user running Adobe Reader or crash the Adobe Reader application, thereby causing a Denial of Service (DoS) condition.

These issues are also described in the following documents:
    APSB09-07 at:
US-CERT-TA09-161A at:
CVE-2009-0198 at:
CVE-2009-0509 at:
CVE-2009-0510 at:
CVE-2009-0511 at:
CVE-2009-0512 at:
CVE-2009-0888 at:
CVE-2009-0889 at:
CVE-2009-1855 at:
CVE-2009-1856 at:
CVE-2009-1857 at:
CVE-2009-1858 at:
CVE-2009-1859 at:
CVE-2009-1861 at:

2. Contributing Factors

These issues can occur in the following release:

SPARC Platform
  • Solaris 10 without patch 121104-10
Note 1: Solaris 8, Solaris 9, Solaris 10 on the x86 platform, and OpenSolaris do not ship Adobe Reader and therefore are not affected by this issue.

Note 2: All versions of Adobe Reader 9 and Adobe Acrobat 9 prior to 9.1.2 are affected by these issues.  All versions of Adobe Acrobat 8 prior to 8.1.6 and all versions of Adobe Acrobat 7 prior to Acrobat 7.1.3 are affected by these issues as well.

To determine the version of Adobe Reader installed on the system, the following command can be run:
    $ /usr/bin/acroread -version
Earlier versions of Adobe Reader on Solaris 10 only shipped acroread in /usr/sfw/bin which do not support the "-version" option, so for such instances, the following command can be used instead:
    $ cat `pkgchk -l -P AcroVersion SUNWacroread | awk '/Pathname/ { print $2 }'`
3. Symptoms

There are no predictable symptoms that would indicate that these issues have been exploited to execute arbitrary code.

4. Workaround

To avoid the described issues, do not load PDF files from untrusted sources.

5. Resolution

These issues are addressed in the following releases:

SPARC Platform
  • Solaris 10 with patch 121104-10 or later
For more information on Security Sun Alerts, see 1009886.1.

This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements.

Copyright 2000-2009 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved.

Modification History
01-Sep-2009: Updated Contributing Factors and Resolution sections. Resolved.



This solution has no attachment