Kaspersky ID:
KLA11780
Date de la détection:
05/12/2020
Mis à jour:
01/22/2024

Description

Multiple vulnerabilities were found in in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Memory access vulnerability can be exploited to obtain sensitive information.
  2. Race condition vulnerability can be exploited to bypass security restrictions.
  3. Security vulnerability can be exploited to bypass security restrictions.
  4. Use after free vulnerability can be exploited to execute arbitrary code.
  5. Buffer vulnerability can be exploited to execute arbitrary code.
  6. Out of bound read vulnerability can be exploited to obtain sensitive information.
  7. Stack exhaustion vulnerability can be exploited to cause denial of service.
  8. Out of bounds write vulnerability can be exploited to execute arbitrary code.
  9. Null pointer vulnerability can be exploited to cause denial of service.
  10. Heap overflow vulnerability can be exploited to execute arbitrary code.

Fiches de renseignement originales

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2020-9598
    warning
  • CVE-2020-9593
    warning
  • CVE-2020-9615
    high
  • CVE-2020-9613
    high
  • CVE-2020-9607
    high
  • CVE-2020-9595
    warning
  • CVE-2020-9604
    high
  • CVE-2020-9602
    warning
  • CVE-2020-9606
    warning
  • CVE-2020-9603
    warning
  • CVE-2020-9599
    warning
  • CVE-2020-9611
    warning
  • CVE-2020-9594
    high
  • CVE-2020-9614
    high
  • CVE-2020-9608
    warning
  • CVE-2020-9610
    warning
  • CVE-2020-9596
    high
  • CVE-2020-9601
    warning
  • CVE-2020-9600
    warning
  • CVE-2020-9605
    high
  • CVE-2020-9592
    high
  • CVE-2020-9609
    warning
  • CVE-2020-9597
    high
  • CVE-2020-9612
    high

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.