KLA10880
Multiple vulnerabilities in Adobe Acrobat Reader
Обновлено: 17/06/2019
Дата обнаружения
11/10/2016
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code or bypass security restrictions.

Below is a complete list of vulnerabilities

  1. Use-after-free, buffer overflow, memory corruption and integer overflow vulnerabilities can be exploited remotely to execute arbitrary code;
  2. An unknown vulnerability can be exploited remotely to bypass Javascript API restrictions;
  3. An unknown vulnerability can be exploited to bypass security restrictions.
Пораженные продукты

Adobe Actobat DC Continuous versions earlier than 15.020.20039
Adobe Actobat Reader DC Continuous versions earlier than 15.020.20039
Adobe Acrobat DC Classic versions earlier than 15.006.30243
Adobe Acrobat Reader DC Classic versions earlier than 15.006.30243
Adobe Acrobat XI versions earrlier than 11.0.18
Adobe Reader XI versions earlier than 11.0.18

Решение

Update to the latest version
Get Reader

Первичный источник обнаружения
Adobe bulletin
Оказываемое влияние
?
ACE 
[?]

SB 
[?]
Связанные продукты
Adobe Reader XI
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader DC Classic
CVE-IDS
CVE-2016-108910.0Critical
CVE-2016-109110.0Critical
CVE-2016-693910.0Critical
CVE-2016-694010.0Critical
CVE-2016-694110.0Critical
CVE-2016-694210.0Critical
CVE-2016-694310.0Critical
CVE-2016-694410.0Critical
CVE-2016-694510.0Critical
CVE-2016-694610.0Critical
CVE-2016-694710.0Critical
CVE-2016-694810.0Critical
CVE-2016-694910.0Critical
CVE-2016-695010.0Critical
CVE-2016-695110.0Critical
CVE-2016-695210.0Critical
CVE-2016-695310.0Critical
CVE-2016-695410.0Critical
CVE-2016-695510.0Critical
CVE-2016-695610.0Critical
CVE-2016-695710.0Critical
CVE-2016-695810.0Critical
CVE-2016-695910.0Critical
CVE-2016-696010.0Critical
CVE-2016-696110.0Critical
CVE-2016-696210.0Critical
CVE-2016-696310.0Critical
CVE-2016-696410.0Critical
CVE-2016-696510.0Critical
CVE-2016-696610.0Critical
CVE-2016-696710.0Critical
CVE-2016-696810.0Critical
CVE-2016-696910.0Critical
CVE-2016-697010.0Critical
CVE-2016-697110.0Critical
CVE-2016-697210.0Critical
CVE-2016-697310.0Critical
CVE-2016-697410.0Critical
CVE-2016-697510.0Critical
CVE-2016-697610.0Critical
CVE-2016-697710.0Critical
CVE-2016-697810.0Critical
CVE-2016-697910.0Critical
CVE-2016-698810.0Critical
CVE-2016-699310.0Critical
CVE-2016-699410.0Critical
CVE-2016-699510.0Critical
CVE-2016-699610.0Critical
CVE-2016-699710.0Critical
CVE-2016-699810.0Critical
CVE-2016-701910.0Critical
CVE-2016-701810.0Critical
CVE-2016-701710.0Critical
CVE-2016-701610.0Critical
CVE-2016-701510.0Critical
CVE-2016-701410.0Critical
CVE-2016-701310.0Critical
CVE-2016-701210.0Critical
CVE-2016-701110.0Critical
CVE-2016-701010.0Critical
CVE-2016-700910.0Critical
CVE-2016-700810.0Critical
CVE-2016-700710.0Critical
CVE-2016-700610.0Critical
CVE-2016-700510.0Critical
CVE-2016-700410.0Critical
CVE-2016-700310.0Critical
CVE-2016-700210.0Critical
CVE-2016-700110.0Critical
CVE-2016-700010.0Critical
CVE-2016-699910.0Critical