Kaspersky ID:
KLA12187
Detect Date:
05/11/2021
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, gain privileges.

Below is a complete list of vulnerabilities:

  1. A buffer overflow vulnerability can be exploited to execute arbitrary code.
  2. A heap buffer overflow vulnerability can be exploited to execute arbitrary code.
  3. An out of bounds read vulnerability can be exploited to cause denial of service or obtain sensitive information.
  4. An out of bounds read vulnerability can be exploited to obtain sensitive information.
  5. An out of bounds read vulnerability can be exploited to execute arbitrary code.
  6. An out of bound write vulnerability can be exploited to execute arbitrary code.
  7. An information disclosure vulnerability can be exploited to gain privileges or obtain sensitive information.
  8. A use after free vulnerability can be exploited to execute arbitrary code.

Original advisories

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2021-21044
    critical
  • CVE-2021-21038
    critical
  • CVE-2021-21086
    critical
  • CVE-2021-28561
    critical
  • CVE-2021-28560
    critical
  • CVE-2021-28558
    critical
  • CVE-2021-28557
    warning
  • CVE-2021-28555
    high
  • CVE-2021-28565
    critical
  • CVE-2021-28564
    critical
  • CVE-2021-28559
    high
  • CVE-2021-28562
    critical
  • CVE-2021-28550
    critical
  • CVE-2021-28553
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.