Kaspersky ID:
KLA12586
Detect Date:
07/12/2022
Updated:
01/25/2024

Description

Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in media can be exploited to execute arbitrary code.
  2. Out of bounds memory write vulnerability can be exploited to execute arbitrary code.
  3. Use after free vulnerability in media can be exploited to cause denial of service.
  4. Uninitialized pointer vulnerability can be exploited to execute arbitrary code.
  5. Out of bounds memory read vulnerability can be exploited to cause denial of service.
  6. Out of bounds memory read vulnerability can be exploited to execute arbitrary code.
  7. Type confusion vulnerability can be exploited to execute arbitrary code.

Original advisories

Related products

CVE list

  • CVE-2022-34225
    critical
  • CVE-2022-34217
    critical
  • CVE-2022-34233
    high
  • CVE-2022-34228
    critical
  • CVE-2022-34224
    critical
  • CVE-2022-34239
    high
  • CVE-2022-34229
    critical
  • CVE-2022-34223
    critical
  • CVE-2022-34220
    critical
  • CVE-2022-34234
    high
  • CVE-2022-34222
    critical
  • CVE-2022-34216
    critical
  • CVE-2022-34219
    critical
  • CVE-2022-34221
    critical
  • CVE-2022-34238
    high
  • CVE-2022-34237
    high
  • CVE-2022-34230
    critical
  • CVE-2022-34227
    critical
  • CVE-2022-34226
    critical
  • CVE-2022-34232
    high
  • CVE-2022-34215
    critical
  • CVE-2022-34236
    high
  • CVE-2022-35669
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.