-->
Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938)
Published: February 9, 2016
Guigui69 Thanks for your interest in Foxit Software.Foxit PhantomPDF is compatible with Windows 2016 Server and Citrix Xenapp. We encourage you give it a try at your convenience,it will give you 14 free trial days.You could download it from our official download center below. Supported Platforms: Windows 10, 8.1, 7, XP 2. SumatraPDF is an open-source and lightweight PDF reader software that you can install and use on your Windows computer.
Adobe® Acrobat® Reader® DC is free software you can use to read and access the information contained within PDF files. Adobe Acrobat Reader DC contains many capabilities specifically designed to make it easier for people with disabilities to read PDF files, regardless of whether the files have been optimized for accessibility. Microsoft Windows® XP with Service Pack 3 for 32 bit or Service Pack 2 for 64 bit; Windows Server 2008 or 2008 R2 (32 bit and 64 bit); Windows 7 (32 bit and 64 bit); Windows 8 or 8.1 (32 bit and 64 bit) 256 MB of RAM (512 MB recommended) 320 MB of available hard-disk space; 1024 x 768 screen resolution. Another free PDF reader for Windows 10, 8, 7, Vista, and XP is Nuance PDF Reader. A really valuable search function is included in Nuance PDF Reader. The words you search for show up with a bit of context for easier understanding as to where the search terms are at in the text.
Version: 1.0
Executive Summary
This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls, which could allow an attacker to run arbitrary code on the user's system. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. However, an attacker would have no way to force users to download or open a malicious PDF document.
This security update is rated Critical for all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows 10. For more information, see the Affected Software section.
The update addresses the vulnerabilities by changing how memory is handled when API calls are made to the PDF Library, and by modifying how Windows Reader parses files. For more information about the vulnerabilities, see the Vulnerability Information section.
For more information about this update, see Microsoft Knowledge Base Article 3138938.
Affected Software and Vulnerability Severity Ratings
The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the February bulletin summary.
**Operating System** | [**Microsoft PDF Library Buffer Overflow Vulnerability - CVE-2016-0058**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0058) | [**Microsoft Windows Reader Vulnerability - CVE-2016-0046**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0046) | **Updates Replaced** |
**Windows 8.1** | |||
[Windows 8.1 for 32-bit Systems](https://www.microsoft.com/download/details.aspx?familyid=e191962e-7f9d-47d8-88db-65ba9d1a6286) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
[Windows 8.1 for x64-based Systems](https://www.microsoft.com/download/details.aspx?familyid=d470f055-8e7a-46ce-ad87-4ae65b2610b9) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
**Windows Server 2012 and Windows Server 2012 R2** | |||
[Windows Server 2012](https://www.microsoft.com/download/details.aspx?familyid=a4376aa7-43cb-4a3d-b10c-17934dac1d98) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
[Windows Server 2012 R2](https://www.microsoft.com/download/details.aspx?familyid=7d6fad6f-8293-415f-aec4-2ef6610f4154) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
**Windows 10** | |||
[Windows 10 for 32-bit Systems](https://support.microsoft.com/kb/3135174)[1](3135174) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
[Windows 10 for x64-based Systems](https://support.microsoft.com/kb/3135174)[1](3135174) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
**Server Core installation option** | |||
[Windows Server 2012 R2](https://www.microsoft.com/download/details.aspx?familyid=7d6fad6f-8293-415f-aec4-2ef6610f4154) (Server Core installation) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
Vulnerability Information
Microsoft Windows Reader Vulnerability - CVE-2016-0046
A remote code execution vulnerability exists in Microsoft Windows when a specially crafted file is opened in Windows Reader. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user. If a user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
For an attack to succeed, a user must open a specially crafted Windows Reader file with an affected version of Windows Reader. In an email attack scenario, an attacker would have to convince the user to open a specially crafted Windows Reader file. The update addresses the vulnerability by modifying how Windows Reader parses files.
This security update is rated Critical for all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows 10. For more information, see the Affected Software section.
The update addresses the vulnerabilities by changing how memory is handled when API calls are made to the PDF Library, and by modifying how Windows Reader parses files. For more information about the vulnerabilities, see the Vulnerability Information section.
For more information about this update, see Microsoft Knowledge Base Article 3138938.
Affected Software and Vulnerability Severity Ratings
The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the February bulletin summary.
**Operating System** | [**Microsoft PDF Library Buffer Overflow Vulnerability - CVE-2016-0058**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0058) | [**Microsoft Windows Reader Vulnerability - CVE-2016-0046**](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-0046) | **Updates Replaced** |
**Windows 8.1** | |||
[Windows 8.1 for 32-bit Systems](https://www.microsoft.com/download/details.aspx?familyid=e191962e-7f9d-47d8-88db-65ba9d1a6286) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
[Windows 8.1 for x64-based Systems](https://www.microsoft.com/download/details.aspx?familyid=d470f055-8e7a-46ce-ad87-4ae65b2610b9) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
**Windows Server 2012 and Windows Server 2012 R2** | |||
[Windows Server 2012](https://www.microsoft.com/download/details.aspx?familyid=a4376aa7-43cb-4a3d-b10c-17934dac1d98) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
[Windows Server 2012 R2](https://www.microsoft.com/download/details.aspx?familyid=7d6fad6f-8293-415f-aec4-2ef6610f4154) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
**Windows 10** | |||
[Windows 10 for 32-bit Systems](https://support.microsoft.com/kb/3135174)[1](3135174) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
[Windows 10 for x64-based Systems](https://support.microsoft.com/kb/3135174)[1](3135174) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
**Server Core installation option** | |||
[Windows Server 2012 R2](https://www.microsoft.com/download/details.aspx?familyid=7d6fad6f-8293-415f-aec4-2ef6610f4154) (Server Core installation) (3123294) | **Critical** Remote Code Execution | **Critical** Remote Code Execution | None |
Vulnerability Information
Microsoft Windows Reader Vulnerability - CVE-2016-0046
A remote code execution vulnerability exists in Microsoft Windows when a specially crafted file is opened in Windows Reader. An attacker who successfully exploited this vulnerability could cause arbitrary code to execute in the context of the current user. If a user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
For an attack to succeed, a user must open a specially crafted Windows Reader file with an affected version of Windows Reader. In an email attack scenario, an attacker would have to convince the user to open a specially crafted Windows Reader file. The update addresses the vulnerability by modifying how Windows Reader parses files.
Pdf Reader For Windows Server 2016 32-bit
Acrobat xi free download for windows 7. The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:
Vulnerability title | CVE number | Publicly disclosed | Exploited |
Microsoft Windows Reader Vulnerability | CVE-2016-0046 | No | No |
Vulnerability title | CVE number | Publicly disclosed | Exploited |
Microsoft PDF Library Buffer Overflow Vulnerability | CVE-2016-0058 | No | No |
This is a quick 'How To' fix for when you're trying to open Adobe Acrobat Reader from the desktop shortcut in Windows 2016 or 2012R2 environment and discover that it is slow to open and then crashes. I had to muck around with this for a good hour or so to rectify the issue, so hopefully this saves you the time.
The issue is because of the default setting of the preference setting for Protected Mode on Startup being enabled. This has never worked well under an RDP environment and Adobe has never done anything to address it, which is a pain and with a recent update has basically crippled the Reader in an RDP environment.
So how do you fix it? It's pretty simple and the process is as follows. Adobe reader xi gratis. Copy a valid PDF file to the desktop of the affected user. Right click on the PDF file and select Open With > Adobe Acrobat Reader DC.
The file you have selected to open should now be opened in Reader successfully without crashing. Now to prevent Acrobat constantly failing into the future, we'll now edit the settings to disable Protected Mode on Startup.
Click the Edit menu > Preferences > Select Security (Enhanced) > Untick Enable Protected Mode at startup > Click Yes > Click OK. This will prevent Adobe of running in Protected Mode from now on. Close Reader down and then try and re-open it from the desktop shortcut and it should open without issue. Adobe reader para pc.
Windows Server 2016 Book Pdf
If you've found this useful, you may want to sign up to our newsletter where you'll receive notices on when we post new articles and helpful 'how tos'. Just fill out your details below and we'll do the rest..