Searching
..

Click anywhere to stop

KLA10935
Multiple vulnerabilities in Adobe Acrobat and Adobe Reader

Updated: 01/22/2024
Detect date
?
01/05/2017
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Adobe Acrobat and Adobe Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code or bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A type confusion vulnerability in the XSLT engine related to localization functionality can be exploited remotely to execute arbitrary code;
  2. Use-after-free vulnerabilities in XFA engine, which are related to layout functionality, sub-form functionality and validation functionality can be exploited remotely to execute arbitrary code;
  3. Use-after-free vulnerabilities in JavaScript engine can be exploited remotely to execute arbitrary code;
  4. Heap buffer overflow vulnerabilities while processing and parsing TIFF image data can be exploited remotely to execute arbitrary code;
  5. Heap buffer overflow vulnerability while parsing the segment for storing non-graphic information can be exploited remotely to execute arbitrary code;
  6. Heap buffer overflow vulnerability in the XSLT engine can be exploited remotely to execute arbitrary code;
  7. Heap buffer overflow vulnerabilities in the image conversion engine, which are related to parsing of color profile metadata and parsing malformed TIFF segments can be exploited remotely to execute arbitrary code;
  8. Buffer overflow/underflow vulnerabilities in XFA engine and the image conversion module related to parsing tags in TIFF files can be exploited remotely to execute arbitrary code;
  9. Memory corruption vulnerabilities in processing a malformed cross-reference table, JPEG 2000 files, Compact Format data, tags in TIFF images can be exploited remotely to execute arbitrary code;
  10. Memory corruption vulnerabilities in parsing of crafted TIFF image, image conversion module when processing TIFF image files or handling malformed ones can be exploited remotely to execute arbitrary code;
  11. Memory corruption vulnerabilities in image conversion engine related to parsing of EXIF (JPEG EXIF) metadata, TIFF file parsing and handling of the color profile in a TIFF file can be exploited remotely to execute arbitrary code;
  12. Memory corruption vulnerability in the XFA engine related to structure and organization of a form can be exploited remotely to execute arbitrary code;
  13. Vulnerability occuring while manipulating Form Data Format (FDF) can be exploited remotely to bypass security restrictions;
  14. Heap buffer overflow vulnerabilities in the JPEG decoder routine and in the XSLT engine related to template manipulation can be exploited remotely to execute arbitrary code;
  15. Memory corruption vulnerability in the image conversion module related to JPEG parsing can be exploited remotely to execute arbitrary code.

NB: Not every vulnerability already have CVSS rating so cumulative CVSS rating can be not representative.

NB: At this moment Adobe has just reserved CVE numbers for some of these vulnerabilities. Information can be changed soon.

Affected products

Adobe Reader XI 11.0.18 and earlier versions  
Adobe Acrobat XI 11.0.18 and earlier versions
Adobe Acrobat DC Classic 15.006.30244 and earlier versions 
Adobe Acrobat DC Continuous 15.020.20042 and earlier versions
Adobe Acrobat Reader DC Classic 15.006.30244 and earlier versions 
Adobe Acrobat Reader DC Continuous 15.020.20042 and earlier versions  

Solution

Update to the latest version
Get Adobe Acrobat DC
Get Adobe Acrobat Reader DC
Get Adobe Reader XI

Original advisories

APSB17-01

Impacts
?
ACE 
[?]

DoS 
[?]

SB 
[?]
Related products
Adobe Reader XI
Adobe Acrobat XI
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat DC Classic
CVE-IDS
?
CVE-2017-29399.3Critical
CVE-2017-29409.3Critical
CVE-2017-29419.3Critical
CVE-2017-29429.3Critical
CVE-2017-29439.3Critical
CVE-2017-29449.3Critical
CVE-2017-29459.3Critical
CVE-2017-29469.3Critical
CVE-2017-29474.3Warning
CVE-2017-29489.3Critical
CVE-2017-29729.3Critical
CVE-2017-29719.3Critical
CVE-2017-29709.3Critical
CVE-2017-29679.3Critical
CVE-2017-29669.3Critical
CVE-2017-29659.3Critical
CVE-2017-29649.3Critical
CVE-2017-29639.3Critical
CVE-2017-29629.3Critical
CVE-2017-29619.3Critical
CVE-2017-29609.3Critical
CVE-2017-29599.3Critical
CVE-2017-29589.3Critical
CVE-2017-29579.3Critical
CVE-2017-29569.3Critical
CVE-2017-29559.3Critical
CVE-2017-29549.3Critical
CVE-2017-29539.3Critical
CVE-2017-29529.3Critical
CVE-2017-29519.3Critical
CVE-2017-29509.3Critical
CVE-2017-29499.3Critical
Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Find out the statistics of the vulnerabilities spreading in your region