Vulnerability Name:

CVE-2010-4091 (CCN-62996)

Assigned:2010-11-03
Published:2010-11-03
Updated:2018-10-30
Summary:The EScript.api plugin in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.1, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document that triggers memory corruption, involving the printSeps function.
Note: some of these details are obtained from third party information.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.6 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Full-Disclosure Mailing List, Wed Nov 03 2010
[0dayz] Acrobat Reader Memory Corruption Remote Arbitrary Code Execution

Source: FULLDISC
Type: Exploit
20101103 [0dayz] Acrobat Reader Memory Corruption Remote Arbitrary Code Execution

Source: MISC
Type: UNKNOWN
http://blogs.adobe.com/psirt/2010/11/potential-issue-in-adobe-reader.html

Source: MITRE
Type: CNA
CVE-2010-4091

Source: MISC
Type: UNKNOWN
http://extraexploit.blogspot.com/2010/11/full-disclosure-xplpdf-adober-reader-94.html

Source: CCN
Type: Adobe Web site
Adobe Reader

Source: SUSE
Type: UNKNOWN
SUSE-SA:2010:058

Source: OSVDB
Type: UNKNOWN
69005

Source: CCN
Type: RHSA-2010-0934
Critical: acroread security update

Source: CCN
Type: SA42095
Adobe Reader Doc.printSeps() Memory Corruption Vulnerability

Source: SECUNIA
Type: Vendor Advisory
42095

Source: SECUNIA
Type: Vendor Advisory
42401

Source: SECUNIA
Type: Vendor Advisory
43025

Source: GENTOO
Type: UNKNOWN
GLSA-201101-08

Source: CCN
Type: SECTRACK ID: 1024684
Adobe Reader Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: Adobe Product Security Bulletin APSB10-28
Security updates available for Adobe Reader and Acrobat

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.adobe.com/support/security/bulletins/apsb10-28.html

Source: CONFIRM
Type: UNKNOWN
http://www.adobe.com/support/security/bulletins/apsb11-03.html

Source: EXPLOIT-DB
Type: Exploit
15419

Source: CCN
Type: GLSA-201101-08
Adobe Reader: Multiple vulnerabilities

Source: CCN
Type: IBM Security Solutions Protection Alert
Adobe Reader Heap Corruption vulnerability

Source: CCN
Type: OSVDB ID: 69005
Adobe Reader EScript.api Plugin printSeps Function Memory Corruption

Source: REDHAT
Type: UNKNOWN
RHSA-2010:0934

Source: BID
Type: UNKNOWN
44638

Source: CCN
Type: BID-44638
Adobe Reader 9.4 Remote Memory Corruption Vulnerability

Source: SECTRACK
Type: UNKNOWN
1024684

Source: SECTRACK
Type: UNKNOWN
1025033

Source: VUPEN
Type: Vendor Advisory
ADV-2010-2890

Source: VUPEN
Type: Vendor Advisory
ADV-2010-3111

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0191

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0337

Source: XF
Type: UNKNOWN
adobe-reader-pdf-file-ce(62996)

Source: XF
Type: UNKNOWN
adobe-reader-pdf-file-ce(62996)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:12527

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [11-04-2010]

Source: SUSE
Type: SUSE-SA:2010:058
Acrobat Reader security issues

Source: SUSE
Type: SUSE-SA:2011:011
Adobe Acrobat Reader

Vulnerable Configuration:Configuration 1:
  • cpe:/a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:adobe:acrobat:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:10.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:*:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:rhel_extras:6:*:*:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2010-4091 (CCN-65281)

    Assigned:2010-10-25
    Published:2011-02-08
    Updated:2011-02-08
    Summary:An unspecified vulnerability in Adobe Reader and Acrobat related to improper input validation could allow an attacker to corrupt memory and execute arbitrary code or cause a denial of service using unknown attack vectors.
    CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Changed
    Impact Metrics:Confidentiality (C): High
    Integrity (I): High
    Availibility (A): High
    CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
    6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
    6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.8 Medium (REDHAT CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
    5.0 Medium (REDHAT Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2010-4091

    Source: CCN
    Type: RHSA-2010-0934
    Critical: acroread security update

    Source: CCN
    Type: SA42095
    Adobe Reader Doc.printSeps() Memory Corruption Vulnerability

    Source: CCN
    Type: SA43207
    Adobe Reader / Acrobat Multiple Vulnerabilities

    Source: CCN
    Type: SECTRACK ID: 1024684
    Adobe Reader Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code

    Source: CCN
    Type: Adobe Product Security Bulletin APSB11-03
    Security updates available for Adobe Reader and Acrobat

    Source: CCN
    Type: OSVDB ID: 69005
    Adobe Reader EScript.api Plugin printSeps Function Memory Corruption

    Source: CCN
    Type: BID-44638
    Adobe Reader 9.4 Remote Memory Corruption Vulnerability

    Source: XF
    Type: UNKNOWN
    reader-input-code-execution(65281)

    Source: SUSE
    Type: SUSE-SA:2010:058
    Acrobat Reader security issues

    Source: SUSE
    Type: SUSE-SA:2011:011
    Adobe Acrobat Reader

    Vulnerable Configuration:Configuration RedHat 1:
  • cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • Configuration RedHat 2:
  • cpe:/a:redhat:rhel_extras:6:*:*:*:*:*:*:*
  • Configuration RedHat 3:
  • cpe:/a:redhat:rhel_extras:5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:adobe:acrobat:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.0:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.0:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0::professional_extended:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1:*:standard:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:8.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:8.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:rhel_extras:4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20104091
    V
    CVE-2010-4091
    2015-11-16
    oval:org.mitre.oval:def:23656
    P
    ELSA-2010:0934: acroread security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:22268
    P
    RHSA-2010:0934: acroread security update (Critical)
    2014-02-24
    oval:org.mitre.oval:def:12527
    V
    Denial of service vulnerability in EScript.api plugin in Adobe Acrobat and Adobe Reader 9.4.0, 8.1.7 and other versions using a crafted PDF document
    2013-08-12
    oval:com.redhat.rhsa:def:20100934
    P
    RHSA-2010:0934: acroread security update (Critical)
    2010-12-07
    BACK
    adobe acrobat reader 8.0
    adobe acrobat reader 8.1
    adobe acrobat reader 8.1.1
    adobe acrobat reader 8.1.2
    adobe acrobat reader 8.1.4
    adobe acrobat reader 8.1.5
    adobe acrobat reader 8.1.6
    adobe acrobat reader 8.1.7
    adobe acrobat reader 8.2
    adobe acrobat reader 8.2.1
    adobe acrobat reader 8.2.2
    adobe acrobat reader 8.2.3
    adobe acrobat reader 8.2.4
    adobe acrobat reader 9.0
    adobe acrobat reader 9.1
    adobe acrobat reader 9.1.1
    adobe acrobat reader 9.1.2
    adobe acrobat reader 9.1.3
    adobe acrobat reader 9.2
    adobe acrobat reader 9.3
    adobe acrobat reader 9.3.1
    adobe acrobat reader 9.3.2
    adobe acrobat reader 9.3.3
    adobe acrobat reader 9.3.4
    adobe acrobat reader 9.4
    adobe acrobat reader 10.0
    apple mac os x *
    microsoft windows *
    adobe acrobat 8.0
    adobe acrobat 8.1
    adobe acrobat 8.1.1
    adobe acrobat 8.1.2
    adobe acrobat 8.1.3
    adobe acrobat 8.1.4
    adobe acrobat 8.1.5
    adobe acrobat 8.1.6
    adobe acrobat 8.1.7
    adobe acrobat 8.2
    adobe acrobat 8.2.1
    adobe acrobat 8.2.2
    adobe acrobat 8.2.3
    adobe acrobat 8.2.4
    adobe acrobat 9.0
    adobe acrobat 9.1
    adobe acrobat 9.1.1
    adobe acrobat 9.1.2
    adobe acrobat 9.1.3
    adobe acrobat 9.2
    adobe acrobat 9.3
    adobe acrobat 9.3.1
    adobe acrobat 9.3.2
    adobe acrobat 9.3.3
    adobe acrobat 9.3.4
    adobe acrobat 9.4
    adobe acrobat 10.0
    apple mac os x *
    microsoft windows *
    adobe acrobat 8.0
    adobe acrobat 8.0.0
    adobe acrobat 8.1
    adobe acrobat 8.1.1
    adobe acrobat 8.0
    adobe acrobat 8.1
    adobe acrobat 8.1.1
    adobe acrobat 8.1.2
    adobe acrobat 8.0
    adobe acrobat 8.1.1
    adobe acrobat 8.1.2
    adobe acrobat 9
    adobe acrobat 8.1.2
    adobe acrobat 9.0
    adobe acrobat 9.0
    adobe acrobat 9.0
    adobe acrobat reader 8.1.1
    adobe acrobat 9.0
    adobe acrobat reader 9.0
    adobe acrobat reader 8.1.2
    adobe acrobat reader 8.1.4
    adobe acrobat reader 9.1
    adobe acrobat 9.1
    adobe acrobat reader 9.1.1
    adobe acrobat 9.1.1
    adobe acrobat 9.0.0
    adobe acrobat 8.1.3
    adobe acrobat 8.1.4
    adobe acrobat 8.1.4
    adobe acrobat 8.1.3
    adobe acrobat 9.1
    adobe acrobat 8.1.2 security_update
    adobe acrobat 8.1.3
    adobe acrobat 8.1.4
    adobe acrobat 9.1.2
    adobe acrobat reader 9.1.2
    adobe acrobat 9.1.3
    adobe acrobat 8.1.6
    adobe acrobat reader 9.1.3
    adobe acrobat reader 8.1.6
    adobe acrobat reader 8.1.7
    adobe acrobat 8.1.7
    adobe acrobat 9.2
    adobe acrobat reader 9.2
    adobe acrobat reader 8.1.3
    adobe acrobat reader 8.1.5
    adobe acrobat reader 8.2.1
    adobe acrobat reader 9.3.1
    adobe acrobat reader 8.2
    adobe acrobat reader 8.1
    adobe acrobat reader 8.0
    adobe acrobat 8.1.5
    adobe acrobat 9.3
    adobe acrobat 9.3.1
    adobe acrobat 8.2
    adobe acrobat 8.2.1
    adobe acrobat reader 9.3.2
    adobe acrobat 9.3.2
    adobe acrobat reader 9.3.3
    adobe acrobat reader 8.2.2
    adobe acrobat reader 8.2.3
    adobe acrobat 9.3.3
    adobe acrobat reader 9.3.4
    adobe acrobat 9.3.4
    adobe acrobat 9.4
    adobe acrobat reader 9.4
    adobe acrobat 8.2.2
    adobe acrobat 8.2.3
    adobe acrobat 8.2.4
    adobe acrobat 9.4.1
    adobe acrobat reader 9.4.1
    redhat rhel extras 4
    redhat enterprise linux server supplementary 6.0
    redhat enterprise linux workstation supplementary 6.0
    redhat enterprise linux desktop supplementary 6.0