Kaspersky ID:
KLA11622
Detekováno:
11/18/2019
Aktualizováno:
01/22/2024

Popis

Multiple vulnerabilities were found in Adobe Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.

Below is a complete list of vulnerabilities:

  1. Use After Free vulnerability can be exploited to execute arbitrary code
  2. Untrusted Pointer Dereference vulnerability can be exploited to execute arbitrary code
  3. Out-of-Bounds Write vulnerability can be exploited to execute arbitrary code
  4. Out-of-Bounds Read vulnerability can be exploited to obtain sensitive information
  5. Security Bypass vulnerability can be exploited to execute arbitrary code
  6. Heap Overflow vulnerability can be exploited to execute arbitrary code
  7. Buffer Error vulnerability can be exploited to execute arbitrary code
  8. Binary Planting (default folder privilege escalation) vulnerability can be exploited to gain privileges

Oficiální doporučení

Související produkty

seznam CVE

  • CVE-2019-16448
    critical
  • CVE-2019-16460
    critical
  • CVE-2019-16454
    critical
  • CVE-2019-16449
    warning
  • CVE-2019-16446
    critical
  • CVE-2019-16458
    warning
  • CVE-2019-16450
    critical
  • CVE-2019-16459
    critical
  • CVE-2019-16456
    warning
  • CVE-2019-16464
    critical
  • CVE-2019-16461
    warning
  • CVE-2019-16457
    warning
  • CVE-2019-16465
    warning
  • CVE-2019-16453
    critical
  • CVE-2019-16451
    critical
  • CVE-2019-16452
    critical
  • CVE-2019-16445
    critical
  • CVE-2019-16462
    critical
  • CVE-2019-16444
    critical
  • CVE-2019-16463
    critical
  • CVE-2019-16455
    critical

Zobrazit více

Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com

Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Zjistěte více
Kaspersky Premium
Zjistěte více
Do you want to save your changes?
Your message has been sent successfully.