KLA10880
Multiple vulnerabilities in Adobe Acrobat Reader
Updated: 06/18/2020
Detect date
?
10/11/2016
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code or bypass security restrictions.

Below is a complete list of vulnerabilities

  1. Use-after-free, buffer overflow, memory corruption and integer overflow vulnerabilities can be exploited remotely to execute arbitrary code;
  2. An unknown vulnerability can be exploited remotely to bypass Javascript API restrictions;
  3. An unknown vulnerability can be exploited to bypass security restrictions.
Affected products

Adobe Reader XI versions earlier than 11.0.18
Adobe Actobat DC Continuous versions earlier than 15.020.20039
Adobe Actobat Reader DC Continuous versions earlier than 15.020.20039
Adobe Acrobat DC Classic versions earlier than 15.006.30243
Adobe Acrobat Reader DC Classic versions earlier than 15.006.30243
Adobe Acrobat XI versions earrlier than 11.0.18

Solution

Update to the latest version
Get Reader

Original advisories

Adobe bulletin

Impacts
?
ACE 
[?]

SB 
[?]
Related products
Adobe Reader XI
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat DC Classic
CVE-IDS
?
CVE-2016-10890.0Unknown
CVE-2016-10910.0Unknown
CVE-2016-69390.0Unknown
CVE-2016-69400.0Unknown
CVE-2016-69410.0Unknown
CVE-2016-69420.0Unknown
CVE-2016-69430.0Unknown
CVE-2016-69440.0Unknown
CVE-2016-69450.0Unknown
CVE-2016-69460.0Unknown
CVE-2016-69470.0Unknown
CVE-2016-69480.0Unknown
CVE-2016-69490.0Unknown
CVE-2016-69500.0Unknown
CVE-2016-69510.0Unknown
CVE-2016-69520.0Unknown
CVE-2016-69530.0Unknown
CVE-2016-69540.0Unknown
CVE-2016-69550.0Unknown
CVE-2016-69560.0Unknown
CVE-2016-69570.0Unknown
CVE-2016-69580.0Unknown
CVE-2016-69590.0Unknown
CVE-2016-69600.0Unknown
CVE-2016-69610.0Unknown
CVE-2016-69620.0Unknown
CVE-2016-69630.0Unknown
CVE-2016-69640.0Unknown
CVE-2016-69650.0Unknown
CVE-2016-69660.0Unknown
CVE-2016-69670.0Unknown
CVE-2016-69680.0Unknown
CVE-2016-69690.0Unknown
CVE-2016-69700.0Unknown
CVE-2016-69710.0Unknown
CVE-2016-69720.0Unknown
CVE-2016-69730.0Unknown
CVE-2016-69740.0Unknown
CVE-2016-69750.0Unknown
CVE-2016-69760.0Unknown
CVE-2016-69770.0Unknown
CVE-2016-69780.0Unknown
CVE-2016-69790.0Unknown
CVE-2016-69880.0Unknown
CVE-2016-69930.0Unknown
CVE-2016-69940.0Unknown
CVE-2016-69950.0Unknown
CVE-2016-69960.0Unknown
CVE-2016-69970.0Unknown
CVE-2016-69980.0Unknown
CVE-2016-70190.0Unknown
CVE-2016-70180.0Unknown
CVE-2016-70170.0Unknown
CVE-2016-70160.0Unknown
CVE-2016-70150.0Unknown
CVE-2016-70140.0Unknown
CVE-2016-70130.0Unknown
CVE-2016-70120.0Unknown
CVE-2016-70110.0Unknown
CVE-2016-70100.0Unknown
CVE-2016-70090.0Unknown
CVE-2016-70080.0Unknown
CVE-2016-70070.0Unknown
CVE-2016-70060.0Unknown
CVE-2016-70050.0Unknown
CVE-2016-70040.0Unknown
CVE-2016-70030.0Unknown
CVE-2016-70020.0Unknown
CVE-2016-70010.0Unknown
CVE-2016-70000.0Unknown
CVE-2016-69990.0Unknown
Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.