Description
Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, cause denial of service.
Below is a complete list of vulnerabilities:
- Signature verification bypass vulnerability can be exploited to gain privileges.
- Heap-based buffer overflow vulnerability can be exploited to execute arbitrary code.
- Out-of-bounds write vulnerability can be exploited to execute arbitrary code.
- Signature validation bypass vulnerability can be exploited to gain privileges.
- Security feature bypass vulnerability can be exploited to obtain sensitive information and cause denial of service.
- Use-after-free vulnerability can be exploited to execute arbitrary code.
- Race Condition vulnerability can be exploited to gain privileges.
- Improper access control vulnerability can be exploited to gain privileges.
- Out-of-bounds read vulnerability can be exploited to obtain sensitive information.
- Improper input validation vulnerability can be exploited to obtain sensitive information.
- Use-after-free vulnerability can be exploited to obtain sensitive information.
- Improper input validation vulnerability can be exploited to execute arbitrary code.
Original advisories
Related products
- Adobe-Acrobat-Reader-DC-Continuous
- Adobe-Acrobat-DC-Continuous
- Adobe-Acrobat-Reader-2017
- Adobe-Acrobat-2017
- Adobe-Acrobat-Reader-2020
- Adobe-Acrobat-2020
CVE list
- CVE-2020-24429 critical
- CVE-2020-24435 critical
- CVE-2020-24436 critical
- CVE-2020-24439 warning
- CVE-2020-24431 warning
- CVE-2020-24437 critical
- CVE-2020-24428 critical
- CVE-2020-24433 critical
- CVE-2020-24434 warning
- CVE-2020-24427 warning
- CVE-2020-24426 warning
- CVE-2020-24430 critical
- CVE-2020-24438 warning
- CVE-2020-24432 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!