Kaspersky ID:
KLA10772
Detect Date:
03/10/2016
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in Adobe products. Malicious users can exploit these vulnerabilities to cause denial of service or execute arbitrary code.

Below is a complete list of vulnerabilities

  1. Integer overflow vulnerability can be exploited to execute arbitrary code;
  2. An unknown vulnerability can be exploited via a specially designed MPEG-4 data to cause denial of service or execute arbitrary code;
  3. An unknown vulnerability can be exploited to cause denial of service or execute arbitrary code;
  4. Buffer overflow vulnerability can be exploited to cause denial of service or execute arbitrary code;
  5. Use-after-free vulnerability can be exploited to execute arbitrary code.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2016-0995
    critical
  • CVE-2016-0996
    critical
  • CVE-2016-0997
    critical
  • CVE-2016-0998
    critical
  • CVE-2016-0991
    critical
  • CVE-2016-0992
    critical
  • CVE-2016-0993
    critical
  • CVE-2016-0994
    critical
  • CVE-2016-0989
    critical
  • CVE-2016-0990
    critical
  • CVE-2016-0988
    critical
  • CVE-2016-0987
    critical
  • CVE-2016-0986
    critical
  • CVE-2016-0963
    critical
  • CVE-2016-0962
    critical
  • CVE-2016-0961
    critical
  • CVE-2016-0960
    critical
  • CVE-2016-1002
    critical
  • CVE-2016-1001
    high
  • CVE-2016-1010
    critical
  • CVE-2016-1005
    critical
  • CVE-2016-1000
    critical
  • CVE-2016-0999
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.