Description
Multiple vulnerabilities were found in Adobe Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- Use After Free vulnerability can be exploited to execute arbitrary code
- Untrusted Pointer Dereference vulnerability can be exploited to execute arbitrary code
- Out-of-Bounds Write vulnerability can be exploited to execute arbitrary code
- Out-of-Bounds Read vulnerability can be exploited to obtain sensitive information
- Security Bypass vulnerability can be exploited to execute arbitrary code
- Heap Overflow vulnerability can be exploited to execute arbitrary code
- Buffer Error vulnerability can be exploited to execute arbitrary code
- Binary Planting (default folder privilege escalation) vulnerability can be exploited to gain privileges
Original advisories
Related products
- Adobe-Reader
- Adobe-Acrobat
- Adobe-Acrobat-Reader-DC-Continuous
- Adobe-Acrobat-Reader-DC-Classic
- Adobe-Acrobat-DC-Continuous
- Adobe-Acrobat-DC-Classic
- Adobe-Acrobat-Reader-2017
- Adobe-Acrobat-2017
- Adobe-Acrobat-Reader
CVE list
- CVE-2019-16448 critical
- CVE-2019-16460 critical
- CVE-2019-16454 critical
- CVE-2019-16449 warning
- CVE-2019-16446 critical
- CVE-2019-16458 warning
- CVE-2019-16450 critical
- CVE-2019-16459 critical
- CVE-2019-16456 warning
- CVE-2019-16464 critical
- CVE-2019-16461 warning
- CVE-2019-16457 warning
- CVE-2019-16465 warning
- CVE-2019-16453 critical
- CVE-2019-16451 critical
- CVE-2019-16452 critical
- CVE-2019-16445 critical
- CVE-2019-16462 critical
- CVE-2019-16444 critical
- CVE-2019-16463 critical
- CVE-2019-16455 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!