
- #MALWARE IN OSX ADOBE ACROBAT PDF#
- #MALWARE IN OSX ADOBE ACROBAT UPDATE#
- #MALWARE IN OSX ADOBE ACROBAT FREE#
The Qualys Cloud Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership.

In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.įor more information, customers may contact Qualys Technical Support.

To perform a selective vulnerability scan, configure a scan profile to use the following options:Įnsure access to TCP ports 135 and 139 are available.Įnable Windows Authentication (specify Authentication Records). Vulnerability signature version in your account, from the Vulnerability signatures as they become available. These new vulnerability checks are included in QualysĮach Qualys account is automatically updated with the latest The following are links for downloading patches to fix these vulnerabilities:
#MALWARE IN OSX ADOBE ACROBAT UPDATE#
Adobe recommends users of Adobe Acrobat 9.4.7 and earlier versions for Windows and Macintosh update to Adobe Acrobat 9.5. Adobe recommends users of Adobe Acrobat X (10.1.1) for Windows and Macintosh update to Adobe Acrobat X (10.1.2). For users of Adobe Reader 9.4.7 and earlier versions for Windows and Macintosh, who cannot update to Adobe Reader X (10.1.2), Adobe has made available the update Adobe Reader 9.5. Successfully exploiting these vulnerabilities might allow a remote attacker to execute arbitrary code.Īdobe recommends users of Adobe Reader X (10.1.1) and earlier versions for Windows and Macintosh update to Adobe Reader X (10.1.2).
#MALWARE IN OSX ADOBE ACROBAT PDF#
Qualys has released the following checks for these new vulnerabilities:Īdobe Acrobat and Reader Multiple Memory Corruption Vulnerabilities (APSB12-01)Īdobe Acrobat and Reader are applications for handling PDF files.Īdobe Acrobat and Reader are exposed to multiple memory corruption vulnerabilities (CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373).Īdobe Reader X (10.1.1) and earlier 10.x versions for Windows and MacintoshĪdobe Reader 9.4.7 and earlier 9.x versions for WindowsĪdobe Reader 9.4.6 and earlier 9.x versions for MacintoshĪdobe Acrobat X (10.1.1) and earlier 10.x versions for Windows and MacintoshĪdobe Acrobat 9.4.7 and earlier 9.x versions for WindowsĪdobe Acrobat 9.4.6 and earlier 9.x versions for Macintosh To fix newly discovered flaws in their software.
#MALWARE IN OSX ADOBE ACROBAT FREE#
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.

Visit Qualys Security Blog to prioritize remediation. Their networks for these and other new vulnerabilities by accessing Vulnerability checks in the Qualys Cloud Platform to protectĪnnounced today by Adobe. Qualys Vulnerability R&D Lab has released new
