DIESER SERVICE KANN ÜBERSETZUNGEN VON GOOGLE ENTHALTEN. GOOGLE ÜBERNIMMT KEINERLEI VERANTWORTUNG FÜR DIE ÜBERSETZUNGEN. DARUNTER FÄLLT JEGLICHE VERANTWORTUNG IN BEZUG AUF RICHTIGKEIT UND ZUVERLÄSSIGKEIT SOWIE JEGLICHE STILLSCHWEIGENDEN GEWÄHRLEISTUNGEN DER MARKTGÄNGIGKEIT, NICHT-VERLETZUNG VON RECHTEN DRITTER ODER DER EIGNUNG FÜR EINEN BESTIMMTEN ZWECK.

Die Website von Kaspersky Lab wurde für Ihre Bequemlichkeit mithilfe einer Übersetzungssoftware von Google Translate übersetzt. Es wurden angemessene Bemühungen für die Bereitstellung einer akkuraten Übersetzung unternommen. Bitte beachten Sie, dass automatisierte Übersetzungen nicht perfekt sind und menschliche Übersetzer in keinem Fall ersetzen sollen. Übersetzungen werden den Nutzern der Kaspersky-Lab-Website als Service und "wie sie sind" zur Verfügung gestellt. Die Richtigkeit, Zuverlässigkeit oder Korrektheit jeglicher Übersetzungen aus dem Englischen in eine andere Sprache wird weder ausdrücklich noch stillschweigend garantiert. Einige Inhalte (z. B. Bilder, Videos, Flash, usw.) können aufgrund der Einschränkungen der Übersetzungssoftware möglicherweise nicht inhaltsgetreu übersetzt werden.

KLA10992
Multiple vulnerabilities in Adobe Acrobat and Adobe Reader
Aktualisiert: 03/29/2019
Erkennungsdatum
?
04/06/2017
Schweregrad
?
Kritisch
Beschreibung

Multiple serious vulnerabilities have been found in Adobe Acrobat and Adobe Reader. Malicious users can exploit these vulnerabilities to execute arbitary code and possibly cause a denial of service.

Below is a complete list of vulnerabilities:

  1. Use-after-free vulnerabilities in the XML Forms Architecture (XFA) module related to reset form functionality and to the choiceList element can be exploited remotely to execute arbitrary code;
  2. Use-after-free vulnerability occuring while manipulating an internal data structure can be exploited remotely to execute arbitrary code;
  3. Use-after-free vulnerability in the XML Forms Architecture (XFA) engine can be exploited remotely to execute arbitrary code;
  4. Use-after-free vulnerability in the JavaScript engine’s annotation-related API and in the JavaScript API connected with the collaboration functionality can be exploited remotely to execute arbitrary code;
  5. Heap buffer overflow vulnerabilities in image conversion which are related to parsing offsets, internal scan line representation and internal tile manipulation in TIFF files can be exploited remotely to execute arbitrary code;
  6. Heap buffer overflow vulnerability related to JPEG 2000 parsing of the fragment list tag can be exploited remotely to execute arbitrary code;
  7. Memory corruption vulnerabilities in the JBIG2 parsing functionality, in the renderer functionality, in the JPEG 2000 code-stream tile functionality can be exploited remotely to execute arbitrary code;
  8. Memory corruption vulnerability which occurs while handling a malformed PDF file can be exploited remotely to execute arbitrary code;
  9. Memory corruption vulnerability in the PRC (Product Representation Compact) format parser can be exploited remotely to execute arbitrary code;
  10. Memory corruption vulnerability which occurs while manipulating PDF annotations can be exploited remotely to execute arbitrary code;
  11. Memory corruption vulnerability which is related to internal object representation manipulation can be exploited remotely to execute arbitrary code;
  12. Memory corruption vulnerabilities in the image conversion module which are related to processing of TIFF files, processing of the PCX (picture exchange) file format, parsing of GIF files, parsing of JPEG files, manipulating EMF files can be exploited remotely to execute arbitrary code;
  13. Memory corruption vulnerabilities in the modules: AES, JBIG2 image compression can be exploited remotely to execute arbitrary code;
  14. Memory corruption vulnerabilities in the JavaScript engine and PPKLite security handler can be exploited remotely to execute arbitrary code;
  15. Memory corruption vulnerability which occurs while parsing TFF (TrueType font format) stream data can be exploited remotely to execute arbitrary code;
  16. Memory corruption vulnerability in the MakeAccessible plugin which occurs while parsing font data can be exploited remotely to execute arbitrary code;
  17. Memory corruption vulnerability in the JPEG 2000 engine which is related to image scaling can be exploited remotely to execute arbitrary code;
  18. Memory corruption vulnerability in the JavaScript engine which is related to string manipulation can be exploited remotely to execute arbitrary code;
  19. Memory corruption vulnerability in the font manipulation functionality can be exploited remotely to execute arbitrary code;
  20. Integer overflow vulnerability in the CCITT fax PDF filter and in the XFA (XML Forms Achitecture) engine can be exploited remotely to execute arbitrary code;
  21. Multiple vulnerabilities in the weblink module, in the JPEG 2000 parser engine, in the XSLT engine, in the JPEG 2000 code-stream parser can be exploited remotely to cause memory leak, which might lead to obtaining sensitive information or a denial of service;
  22. An incorrect parsing of a JPEG 2000 file, incorrect handling of a JPEG 2000 code-stream and code-stream tile data can be exploited remotely to cause memory leak, which might lead to obtaining sensitive information or a denial of service;
  23. An unspecified vulnerability in the collaboration functionality can be exploited remotely to cause memory leak, which might lead to obtaining sensitive information or a denial of service;
  24. Multiple vulnerabilities in the JPEG 2000 parser, which are related to the palette box functionality and contiguous code-stream parsing can be exploited remotely to cause memory leak, which might lead to obtaining sensitive information or a denial of service;
  25. Multiple vulnerabilities in the image conversion engive which are related to EMF (enhanced meta file format) parsing and APP13 segment in JPEG files parsing can be exploited remotely to cause memory leak, which might lead to obtaining sensitive information or a denial of service;
  26. Insecure library loading vulnerabilities (DLL hijacking) in the OCR plugin and in a DLL which is related to remote logging can be exploited remotely to execute arbitrary code.

NB: This vulnerability have no public CVSS rating so rating can be changed by the time.

Beeinträchtigte Produkte

Adobe Acrobat DC Continuous earlier than 2017.009.20044
Adobe Acrobat Reader DC Continuous earlier than 2017.009.20044
Adobe Acrobat DC Classic earlier than 2015.006.30306
Adobe Acrobat Reader DC Classic earlier than 2015.006.30306
Adobe Acrobat XI earlier than 11.0.20
Adobe Reader XI earlier than 11.0.20

Lösung

Update to the latest versions
Download Adobe Acrobat
Download Adobe Acrobat Reader DC
Download Adobe Reader XI

Ursprüngliche Informationshinweise

Adobe security bulletin

Folgen
?
ACE 
[?]

OSI 
[?]

DoS 
[?]
CVE-IDS
?
CVE-2017-30119.3Critical
CVE-2017-30129.3Critical
CVE-2017-30139.3Critical
CVE-2017-30149.3Critical
CVE-2017-30159.3Critical
CVE-2017-30189.3Critical
CVE-2017-30199.3Critical
CVE-2017-30204.3Critical
CVE-2017-30214.3Critical
CVE-2017-30224.3Critical
CVE-2017-30249.3Critical
CVE-2017-30259.3Critical
CVE-2017-30269.3Critical
CVE-2017-30279.3Critical
CVE-2017-30289.3Critical
CVE-2017-30309.3Critical
CVE-2017-30314.3Critical
CVE-2017-30324.3Critical
CVE-2017-30334.3Critical
CVE-2017-30349.3Critical
CVE-2017-30369.3Critical
CVE-2017-303710.0Critical
CVE-2017-30389.3Critical
CVE-2017-30399.3Critical
CVE-2017-30409.3Critical
CVE-2017-30429.3Critical
CVE-2017-30434.3Critical
CVE-2017-30449.3Critical
CVE-2017-30454.3Critical
CVE-2017-30464.3Critical
CVE-2017-30489.3Critical
CVE-2017-30499.3Critical
CVE-2017-30509.3Critical
CVE-2017-30519.3Critical
CVE-2017-30524.3Critical
CVE-2017-30549.3Critical
CVE-2017-30559.3Critical
CVE-2017-30569.3Critical
CVE-2017-30579.3Critical
CVE-2017-30659.3Critical

Link zum Original