Kaspersky ID:
KLA12418
Detect Date:
01/11/2022
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, cause denial of service, gain privileges, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Input validation vulnerability can be exploited to bypass security restrictions.
  2. Use after free vulnerability can be exploited to execute arbitrary code.
  3. Out of bounds write vulnerability can be exploited to execute arbitrary code.
  4. Heap buffer overflow vulnerability can be exploited to execute arbitrary code.
  5. NULL pointer dereference vulnerability can be exploited to cause denial of service.
  6. Security bypass vulnerability can be exploited to bypass security restrictions.
  7. Use after free vulnerability can be exploited to gain privileges.
  8. Use after free vulnerability can be exploited to cause denial of service.
  9. Out of bounds read vulnerability can be exploited to obtain sensitive information.
  10. Memory access vulnerability can be exploited to cause denial of service or execute arbitrary code.
  11. Out of bounds read vulnerability can be exploited to execute arbitrary code.
  12. Access control vulnerability can be exploited to gain privileges.
  13. Integer overflow vulnerability can be exploited to execute arbitrary code.
  14. Access of uninitialized pointer vulnerability can be exploited to execute arbitrary code.
  15. Out of bounds read vulnerability can be exploited to execute arbitrary code or cause denial of service.
  16. Stack buffer overflow vulnerability can be exploited to execute arbitrary code.
  17. Input validation vulnerability can be exploited to cause denial of service.
  18. Out of bounds write vulnerability can be exploited to execute arbitrary code or cause denial of service.

Original advisories

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2021-44739
    warning
  • CVE-2021-44701
    critical
  • CVE-2021-45068
    critical
  • CVE-2021-44708
    critical
  • CVE-2021-44709
    critical
  • CVE-2021-45064
    critical
  • CVE-2021-44741
    high
  • CVE-2021-44714
    warning
  • CVE-2021-45062
    critical
  • CVE-2021-45063
    high
  • CVE-2021-44713
    high
  • CVE-2021-44707
    critical
  • CVE-2021-44742
    high
  • CVE-2021-44710
    critical
  • CVE-2021-45067
    high
  • CVE-2021-45060
    critical
  • CVE-2021-44702
    warning
  • CVE-2021-45061
    critical
  • CVE-2021-44711
    critical
  • CVE-2021-44705
    critical
  • CVE-2021-44715
    high
  • CVE-2021-44703
    critical
  • CVE-2021-44706
    critical
  • CVE-2021-44740
    high
  • CVE-2021-44712
    high
  • CVE-2021-44704
    critical
  • CVE-2022-24091
    critical
  • CVE-2022-24092
    critical

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.