Detect date
?
|
10/13/2015 |
Severity
?
|
Critical |
Description
|
Multiple serious vulnerabilities have been found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code or obtain sensitive information. Below is a complete list of vulnerabilities
Technical details Vulnerability (1) can be triggered via launching print job on remote printer. Vulnerability (3) can be triggered via using the Format action on unspecified fields. Vulnerability (5) can be triggered via reading light object’s RGB data. This vulnerability leads to color objects information disclosure. (6) related to ANSendForReview method. |
Affected products
|
Adobe Acrobat Reader X versions earlier than 10.1.16 |
Solution
|
Update to the latest version |
Original advisories
|
|
Impacts
?
|
ACE [?] OSI [?] DoS [?] SB [?] |
Related products
|
Adobe Reader X Adobe Acrobat X Adobe Reader XI Adobe Acrobat XI Adobe Acrobat Reader DC Continuous Adobe Acrobat Reader DC Classic Adobe Acrobat DC Continuous Adobe Acrobat DC Classic |
CVE-IDS
?
|
CVE-2015-55834.3Warning
CVE-2015-66974.3Warning CVE-2015-668710.0Critical CVE-2015-558610.0Critical CVE-2015-66869.3Critical CVE-2015-67129.3Critical CVE-2015-67199.3Critical CVE-2015-66859.3Critical CVE-2015-668410.0Critical CVE-2015-76245.0Critical CVE-2015-66989.3Critical CVE-2015-67055.0Critical CVE-2015-67044.3Warning CVE-2015-67079.3Critical CVE-2015-67065.0Critical CVE-2015-67179.3Critical CVE-2015-67089.3Critical CVE-2015-66939.3Critical CVE-2015-67149.3Critical CVE-2015-669110.0Critical CVE-2015-66909.3Critical CVE-2015-66899.3Critical CVE-2015-66889.3Critical CVE-2015-76239.3Critical CVE-2015-762210.0Critical CVE-2015-67239.3Critical CVE-2015-67229.3Critical CVE-2015-668310.0Critical CVE-2015-67159.3Critical CVE-2015-67219.3Critical CVE-2015-66959.3Critical CVE-2015-67209.3Critical CVE-2015-76199.3Critical CVE-2015-67169.3Critical CVE-2015-67189.3Critical CVE-2015-67109.3Critical CVE-2015-67099.3Critical CVE-2015-67259.3Critical CVE-2015-76169.3Critical CVE-2015-76179.3Critical CVE-2015-76189.3Critical CVE-2015-66994.3Warning CVE-2015-67249.3Critical CVE-2015-67119.3Critical CVE-2015-76149.3Critical CVE-2015-76159.3Critical CVE-2015-669610.0Critical CVE-2015-66925.0Critical CVE-2015-76209.3Critical CVE-2015-76219.3Critical CVE-2015-67024.3Warning CVE-2015-67034.3Warning CVE-2015-67005.0Critical CVE-2015-67139.3Critical CVE-2015-66949.3Critical CVE-2015-67014.3Warning |
Exploitation
|
The following public exploits exists for this vulnerability: |