{"id":1835,"date":"2011-12-07T17:45:31","date_gmt":"2011-12-08T01:45:31","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=1835"},"modified":"2012-03-08T17:00:00","modified_gmt":"2012-03-09T01:00:00","slug":"coverage-info-cve-2011-2462","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2011\/12\/coverage-info-cve-2011-2462\/","title":{"rendered":"Coverage Information for Adobe Security Bulletin (CVE-2011-2462)"},"content":{"rendered":"<p>Adobe has published a security bulletin (\"Security Advisory for Adobe Reader and Acrobat\",\u00a0CVE-2011-2462) regarding a vulnerability in Adobe Reader and Acrobat that can allow an attacker to perform remote code execution and gain control of vulnerable hosts. \u00a0Complete information from Adobe is available at\u00a0<a href=\"http:\/\/www.adobe.com\/support\/security\/advisories\/apsa11-04.html\" rel=\"nofollow,noopener\" >http:\/\/www.adobe.com\/support\/security\/advisories\/apsa11-04.html<\/a>.<\/p>\n<p>In response to this disclosure, Palo Alto Networks has released an emergency content update (version 281, released 12\/7\/11) that provides detection of attempted exploitation of the vulnerability described in this security bulletin. \u00a0The following signatures have been added: Signature\u00a034562 (\"Adobe Reader U3D Memory Corruption Vulnerability\") and\u00a034563 (\"Adobe Reader U3D Memory Corruption Vulnerability\").<\/p>\n<p>Palo Alto Networks customers with a Threat Prevention subscription are advised to verify that they are running the latest content version on their devices. \u00a0If you have any questions about coverage for this advisory, please contact <a title=\"support\" href=\"http:\/\/support.paloaltonetworks.com\">support<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adobe has published a security bulletin (\"Security Advisory for Adobe Reader and Acrobat\",\u00a0CVE-2011-2462) regarding a vulnerability in Adobe Reader and Acrobat that can allow an attacker to perform remote code execution and &hellip;<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"coauthors":[],"class_list":["post-1835","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=1835"}],"version-history":[{"count":4,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1835\/revisions"}],"predecessor-version":[{"id":2197,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/1835\/revisions\/2197"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=1835"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=1835"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=1835"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=1835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}