Description
Multiple vulnerabilities were found in in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- Memory access vulnerability can be exploited to obtain sensitive information.
- Race condition vulnerability can be exploited to bypass security restrictions.
- Security vulnerability can be exploited to bypass security restrictions.
- Use after free vulnerability can be exploited to execute arbitrary code.
- Buffer vulnerability can be exploited to execute arbitrary code.
- Out of bound read vulnerability can be exploited to obtain sensitive information.
- Stack exhaustion vulnerability can be exploited to cause denial of service.
- Out of bounds write vulnerability can be exploited to execute arbitrary code.
- Null pointer vulnerability can be exploited to cause denial of service.
- Heap overflow vulnerability can be exploited to execute arbitrary code.
Original advisories
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Adobe-Acrobat-Reader-DC-Continuous
- Adobe-Acrobat-Reader-DC-Classic
- Adobe-Acrobat-DC-Continuous
- Adobe-Acrobat-DC-Classic
- Adobe-Acrobat-Reader-2017
- Adobe-Acrobat-2017
CVE list
- CVE-2020-9598 warning
- CVE-2020-9593 warning
- CVE-2020-9615 high
- CVE-2020-9613 high
- CVE-2020-9607 high
- CVE-2020-9595 warning
- CVE-2020-9604 high
- CVE-2020-9602 warning
- CVE-2020-9606 warning
- CVE-2020-9603 warning
- CVE-2020-9599 warning
- CVE-2020-9611 warning
- CVE-2020-9594 high
- CVE-2020-9614 high
- CVE-2020-9608 warning
- CVE-2020-9610 warning
- CVE-2020-9596 high
- CVE-2020-9601 warning
- CVE-2020-9600 warning
- CVE-2020-9605 high
- CVE-2020-9592 high
- CVE-2020-9609 warning
- CVE-2020-9597 high
- CVE-2020-9612 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!