Дата обнаружения
|
13/10/2015 |
Уровень угрозы
|
Critical |
Описание
|
Multiple serious vulnerabilities have been found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code or obtain sensitive information. Below is a complete list of vulnerabilities
Technical details Vulnerability (1) can be triggered via launching print job on remote printer. Vulnerability (3) can be triggered via using the Format action on unspecified fields. Vulnerability (5) can be triggered via reading light object’s RGB data. This vulnerability leads to color objects information disclosure. (6) related to ANSendForReview method. |
Пораженные продукты
|
Adobe Acrobat Reader X versions earlier than 10.1.16 |
Решение
|
Update to the latest version |
Первичный источник обнаружения
|
Adobe bulletin |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
|
Связанные продукты
|
Adobe Reader X Adobe Acrobat X Adobe Reader XI Adobe Acrobat XI Adobe Acrobat Reader DC Continuous Adobe Acrobat Reader DC Classic Adobe Acrobat DC Continuous Adobe Acrobat DC Classic |
CVE-IDS
|
CVE-2015-55834.3Warning
CVE-2015-66976.8High CVE-2015-66866.8High CVE-2015-67126.8High CVE-2015-67196.8High CVE-2015-66856.8High CVE-2015-76245.0Critical CVE-2015-66986.8High CVE-2015-67055.0Critical CVE-2015-67044.3Warning CVE-2015-67076.8High CVE-2015-67065.0Critical CVE-2015-67176.8High CVE-2015-67086.8High CVE-2015-66936.8High CVE-2015-67146.8High CVE-2015-66906.8High CVE-2015-66896.8High CVE-2015-66886.8High CVE-2015-76236.8High CVE-2015-67236.8High CVE-2015-67226.8High CVE-2015-67156.8High CVE-2015-67216.8High CVE-2015-66956.8High CVE-2015-67206.8High CVE-2015-76196.8High CVE-2015-67166.8High CVE-2015-67186.8High CVE-2015-67106.8High CVE-2015-67096.8High CVE-2015-67256.8High CVE-2015-76166.8High CVE-2015-76176.8High CVE-2015-76186.8High CVE-2015-66994.3Warning CVE-2015-67246.8High CVE-2015-67116.8High CVE-2015-76146.8High CVE-2015-76156.8High CVE-2015-66966.8High CVE-2015-66925.0Critical CVE-2015-76206.8High CVE-2015-76216.8High CVE-2015-67024.3Warning CVE-2015-67034.3Warning CVE-2015-67005.0Critical CVE-2015-67137.5Critical CVE-2015-66946.8High CVE-2015-67014.3Warning |
Эксплуатация
|
The following public exploits exists for this vulnerability: |
Узнай статистику распространения уязвимостей в твоем регионе |