Kaspersky ID:
KLA11708
Erkennungsdatum:
03/17/2020
Aktualisiert:
01/22/2024

Beschreibung

Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.

Below is a complete list of vulnerabilities:

  1. Memory address leak vulnerability can be exploited to obtain sensitive information.
  2. Out of bounds read  vulnerability can be exploited to obtain sensitive information.
  3. Out of bounds write vulnerability can be exploited to execute arbitrary code.
  4. Use after free vulnerability can be exploited to execute arbitrary code.
  5. Buffer overflow vulnerability can be exploited to execute arbitrary code.
  6. Memory corruption vulnerability can be exploited to execute arbitrary code.
  7. Insecure library loading (DLL hijacking) vulnerability can be exploited to gain privileges.
  8. Stack-based buffer overflow vulnerability can be exploited to execute arbitrary code.

Ursprüngliche Informationshinweise

Ausnutzung

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Betroffene Produkte

CVE Liste

  • CVE-2020-3800
    warning
  • CVE-2020-3804
    warning
  • CVE-2020-3795
    critical
  • CVE-2020-3793
    critical
  • CVE-2020-3792
    critical
  • CVE-2020-3805
    critical
  • CVE-2020-3807
    critical
  • CVE-2020-3801
    critical
  • CVE-2020-3797
    critical
  • CVE-2020-3802
    high
  • CVE-2020-3803
    warning
  • CVE-2020-3799
    critical
  • CVE-2020-3806
    warning

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.