KLA10628
Multiple vulnerabilities in Adobe Acrobat

Обновлено: 03/06/2020
Дата обнаружения
14/07/2015
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Adobe Acrobat. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, gain privileges, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Buffer, stack and integer overflows, memory corruption and use-after-free vulnerabilities can be exploited remotely via an unknown vectors;
  2. Lack of validation and Java API restrictions restrictions can be exploited remotely via an unknown vectors;
  3. null-pointer dereference can be exploited remotely via an unknown vectors;
Пораженные продукты

Acrobat Reader X versions earlier than 10.1.15
Acrobat XI versions earlier than 11.0.12
Acrobat X versions earlier than 10.1.15
Acrobat Reader XI versions earlier than 11.0.12
Acrobat DC versions earlier than 2015.008.20082
Acrobat Reader DC versions earlier than 2015.008.20082

Решение

Update to the latest version
Get Reader

Первичный источник обнаружения
Adobe advisory
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Связанные продукты
Adobe Reader X
Adobe Acrobat X
Adobe Reader XI
Adobe Acrobat XI
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat DC Classic
CVE-IDS
CVE-2014-84505.0Critical
CVE-2015-44435.0Critical
CVE-2015-44445.0Critical
CVE-2015-443810.0Critical
CVE-2015-50895.0Critical
CVE-2015-44416.8High
CVE-2015-444510.0Critical
CVE-2015-44467.5Critical
CVE-2015-509710.0Critical
CVE-2015-509810.0Critical
CVE-2015-51096.8High
CVE-2015-51106.8High
CVE-2015-309510.0Critical
CVE-2015-443510.0Critical
CVE-2015-509510.0Critical
CVE-2015-509610.0Critical
CVE-2014-056610.0Critical
CVE-2015-50907.2High
CVE-2015-50917.8Critical
CVE-2015-50925.0Critical
CVE-2015-511410.0Critical
CVE-2015-44529.3Critical
CVE-2015-44519.3Critical
CVE-2015-50866.8High
CVE-2015-50856.8High
CVE-2015-444810.0Critical
CVE-2015-444710.0Critical
CVE-2015-44505.0Critical
CVE-2015-44495.0Critical
CVE-2015-51116.8High
CVE-2015-50885.0Critical
CVE-2015-508710.0Critical
CVE-2015-51136.8High
CVE-2015-511510.0Critical
CVE-2015-510810.0Critical
CVE-2015-51074.3Warning
CVE-2015-51066.8High
CVE-2015-510510.0Critical
CVE-2015-510410.0Critical
CVE-2015-510310.0Critical
CVE-2015-510210.0Critical
CVE-2015-510110.0Critical
CVE-2015-510010.0Critical
CVE-2015-509910.0Critical
CVE-2015-509310.0Critical
CVE-2015-509410.0Critical
Узнай статистику распространения уязвимостей в твоем регионе