Kaspersky ID:
KLA11421
Detect Date:
02/12/2019
Updated:
10/28/2025

Description

Multiple vulnerabilities were found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.

Below is a complete list of vulnerabilities:

  1. Multiple buffer errors vulnerabilities can be exploited remotely to execute arbitrary code;
  2. Multiple data leakage vulnerabilities can be exploited remotely to obtain sensitive information;
  3. Multiple double free vulnerabilities can be exploited remotely to execute arbitrary code;
  4. Multiple integer overflow vulnerabilities can be exploited remotely to obtain sensitive information;
  5. Multiple out-of-bounds read vulnerabilities can be exploited remotely to obtain sensitive information;
  6. Multiple security bypass vulnerabilities can be exploited remotely to gain privileges;
  7. Multiple out-of-bounds write vulnerabilities can be exploited remotely to execute arbitrary code;
  8. Multiple type confusion vulnerabilities can be exploited remotely to execute arbitrary code;
  9. Multiple untrusted pointer dereference vulnerabilities can be exploited remotely to execute arbitrary code;
  10. Multiple use after free vulnerabilities can be exploited remotely to execute arbitrary code.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2019-7020
    critical
  • CVE-2019-7085
    critical
  • CVE-2019-7089
    critical
  • CVE-2019-7080
    critical
  • CVE-2019-7030
    critical
  • CVE-2019-7021
    critical
  • CVE-2019-7022
    critical
  • CVE-2019-7023
    critical
  • CVE-2019-7024
    critical
  • CVE-2019-7028
    critical
  • CVE-2019-7032
    critical
  • CVE-2019-7033
    critical
  • CVE-2019-7034
    critical
  • CVE-2019-7035
    critical
  • CVE-2019-7036
    critical
  • CVE-2019-7038
    critical
  • CVE-2019-7045
    high
  • CVE-2019-7047
    critical
  • CVE-2019-7049
    high
  • CVE-2019-7053
    critical
  • CVE-2019-7055
    critical
  • CVE-2019-7056
    critical
  • CVE-2019-7057
    critical
  • CVE-2019-7058
    critical
  • CVE-2019-7059
    critical
  • CVE-2019-7063
    critical
  • CVE-2019-7064
    critical
  • CVE-2019-7065
    critical
  • CVE-2019-7067
    critical
  • CVE-2019-7071
    high
  • CVE-2019-7073
    high
  • CVE-2019-7074
    high
  • CVE-2019-7081
    critical
  • CVE-2018-19725
    critical
  • CVE-2019-7041
    critical
  • CVE-2019-7019
    critical
  • CVE-2019-7027
    critical
  • CVE-2019-7037
    critical
  • CVE-2019-7039
    critical
  • CVE-2019-7052
    critical
  • CVE-2019-7060
    critical
  • CVE-2019-7079
    critical
  • CVE-2019-7069
    critical
  • CVE-2019-7086
    critical
  • CVE-2019-7087
    critical
  • CVE-2019-7042
    critical
  • CVE-2019-7046
    critical
  • CVE-2019-7051
    critical
  • CVE-2019-7054
    critical
  • CVE-2019-7066
    critical
  • CVE-2019-7076
    critical
  • CVE-2019-7018
    critical
  • CVE-2019-7025
    critical
  • CVE-2019-7026
    critical
  • CVE-2019-7029
    critical
  • CVE-2019-7031
    critical
  • CVE-2019-7040
    critical
  • CVE-2019-7043
    critical
  • CVE-2019-7044
    critical
  • CVE-2019-7048
    critical
  • CVE-2019-7050
    critical
  • CVE-2019-7062
    critical
  • CVE-2019-7068
    critical
  • CVE-2019-7070
    critical
  • CVE-2019-7072
    critical
  • CVE-2019-7075
    high
  • CVE-2019-7077
    critical
  • CVE-2019-7078
    critical
  • CVE-2019-7082
    critical
  • CVE-2019-7083
    critical
  • CVE-2019-7084
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.