KLA10880
Multiple vulnerabilities in Adobe Acrobat Reader
Обновлено: 18/06/2020
Дата обнаружения
11/10/2016
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Adobe Acrobat and Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code or bypass security restrictions.

Below is a complete list of vulnerabilities

  1. Use-after-free, buffer overflow, memory corruption and integer overflow vulnerabilities can be exploited remotely to execute arbitrary code;
  2. An unknown vulnerability can be exploited remotely to bypass Javascript API restrictions;
  3. An unknown vulnerability can be exploited to bypass security restrictions.
Пораженные продукты

Adobe Reader XI versions earlier than 11.0.18
Adobe Actobat DC Continuous versions earlier than 15.020.20039
Adobe Actobat Reader DC Continuous versions earlier than 15.020.20039
Adobe Acrobat DC Classic versions earlier than 15.006.30243
Adobe Acrobat Reader DC Classic versions earlier than 15.006.30243
Adobe Acrobat XI versions earrlier than 11.0.18

Решение

Update to the latest version
Get Reader

Первичный источник обнаружения
Adobe bulletin
Оказываемое влияние
?
ACE 
[?]

SB 
[?]
Связанные продукты
Adobe Reader XI
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat DC Classic
CVE-IDS
CVE-2016-10890.0Unknown
CVE-2016-10910.0Unknown
CVE-2016-69390.0Unknown
CVE-2016-69400.0Unknown
CVE-2016-69410.0Unknown
CVE-2016-69420.0Unknown
CVE-2016-69430.0Unknown
CVE-2016-69440.0Unknown
CVE-2016-69450.0Unknown
CVE-2016-69460.0Unknown
CVE-2016-69470.0Unknown
CVE-2016-69480.0Unknown
CVE-2016-69490.0Unknown
CVE-2016-69500.0Unknown
CVE-2016-69510.0Unknown
CVE-2016-69520.0Unknown
CVE-2016-69530.0Unknown
CVE-2016-69540.0Unknown
CVE-2016-69550.0Unknown
CVE-2016-69560.0Unknown
CVE-2016-69570.0Unknown
CVE-2016-69580.0Unknown
CVE-2016-69590.0Unknown
CVE-2016-69600.0Unknown
CVE-2016-69610.0Unknown
CVE-2016-69620.0Unknown
CVE-2016-69630.0Unknown
CVE-2016-69640.0Unknown
CVE-2016-69650.0Unknown
CVE-2016-69660.0Unknown
CVE-2016-69670.0Unknown
CVE-2016-69680.0Unknown
CVE-2016-69690.0Unknown
CVE-2016-69700.0Unknown
CVE-2016-69710.0Unknown
CVE-2016-69720.0Unknown
CVE-2016-69730.0Unknown
CVE-2016-69740.0Unknown
CVE-2016-69750.0Unknown
CVE-2016-69760.0Unknown
CVE-2016-69770.0Unknown
CVE-2016-69780.0Unknown
CVE-2016-69790.0Unknown
CVE-2016-69880.0Unknown
CVE-2016-69930.0Unknown
CVE-2016-69940.0Unknown
CVE-2016-69950.0Unknown
CVE-2016-69960.0Unknown
CVE-2016-69970.0Unknown
CVE-2016-69980.0Unknown
CVE-2016-70190.0Unknown
CVE-2016-70180.0Unknown
CVE-2016-70170.0Unknown
CVE-2016-70160.0Unknown
CVE-2016-70150.0Unknown
CVE-2016-70140.0Unknown
CVE-2016-70130.0Unknown
CVE-2016-70120.0Unknown
CVE-2016-70110.0Unknown
CVE-2016-70100.0Unknown
CVE-2016-70090.0Unknown
CVE-2016-70080.0Unknown
CVE-2016-70070.0Unknown
CVE-2016-70060.0Unknown
CVE-2016-70050.0Unknown
CVE-2016-70040.0Unknown
CVE-2016-70030.0Unknown
CVE-2016-70020.0Unknown
CVE-2016-70010.0Unknown
CVE-2016-70000.0Unknown
CVE-2016-69990.0Unknown
Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.