Kaspersky ID:
KLA11708
Date de la détection:
03/17/2020
Mis à jour:
01/22/2024

Description

Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.

Below is a complete list of vulnerabilities:

  1. Memory address leak vulnerability can be exploited to obtain sensitive information.
  2. Out of bounds read  vulnerability can be exploited to obtain sensitive information.
  3. Out of bounds write vulnerability can be exploited to execute arbitrary code.
  4. Use after free vulnerability can be exploited to execute arbitrary code.
  5. Buffer overflow vulnerability can be exploited to execute arbitrary code.
  6. Memory corruption vulnerability can be exploited to execute arbitrary code.
  7. Insecure library loading (DLL hijacking) vulnerability can be exploited to gain privileges.
  8. Stack-based buffer overflow vulnerability can be exploited to execute arbitrary code.

Fiches de renseignement originales

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2020-3800
    warning
  • CVE-2020-3804
    warning
  • CVE-2020-3795
    critical
  • CVE-2020-3793
    critical
  • CVE-2020-3792
    critical
  • CVE-2020-3805
    critical
  • CVE-2020-3807
    critical
  • CVE-2020-3801
    critical
  • CVE-2020-3797
    critical
  • CVE-2020-3802
    high
  • CVE-2020-3803
    warning
  • CVE-2020-3799
    critical
  • CVE-2020-3806
    warning

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.