Kaspersky ID:
KLA11622
Detect Date:
11/18/2019
Updated:
01/22/2024

Description

Multiple vulnerabilities were found in Adobe Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.

Below is a complete list of vulnerabilities:

  1. Use After Free vulnerability can be exploited to execute arbitrary code
  2. Untrusted Pointer Dereference vulnerability can be exploited to execute arbitrary code
  3. Out-of-Bounds Write vulnerability can be exploited to execute arbitrary code
  4. Out-of-Bounds Read vulnerability can be exploited to obtain sensitive information
  5. Security Bypass vulnerability can be exploited to execute arbitrary code
  6. Heap Overflow vulnerability can be exploited to execute arbitrary code
  7. Buffer Error vulnerability can be exploited to execute arbitrary code
  8. Binary Planting (default folder privilege escalation) vulnerability can be exploited to gain privileges

Original advisories

Related products

CVE list

  • CVE-2019-16448
    critical
  • CVE-2019-16460
    critical
  • CVE-2019-16454
    critical
  • CVE-2019-16449
    warning
  • CVE-2019-16446
    critical
  • CVE-2019-16458
    warning
  • CVE-2019-16450
    critical
  • CVE-2019-16459
    critical
  • CVE-2019-16456
    warning
  • CVE-2019-16464
    critical
  • CVE-2019-16461
    warning
  • CVE-2019-16457
    warning
  • CVE-2019-16465
    warning
  • CVE-2019-16453
    critical
  • CVE-2019-16451
    critical
  • CVE-2019-16452
    critical
  • CVE-2019-16445
    critical
  • CVE-2019-16462
    critical
  • CVE-2019-16444
    critical
  • CVE-2019-16463
    critical
  • CVE-2019-16455
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.