Дата обнаружения
|
08/08/2017 |
Уровень угрозы
|
Critical |
Описание
|
Multiple serious vulnerabilities have been found in Adobe Acrobat and Adobe Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information or execute arbitrary code. Below is a complete list of vulnerabilities:
Technical details Vulnerabilities (4) are related to text output, rendering a path, bitmap transformations, drawing of Unicode text strings, curve drawing, text strings, polygons, line segments, transformation of blocks of pixels, drawing ASCII text string, transfer of pixel blocks, Bezier curves. |
Пораженные продукты
|
Adobe Acrobat Reader DC Continuous earlier than 17.012.20098 |
Решение
|
Update to the latest versions |
Первичный источник обнаружения
|
Adobe Security Bulletin Update to Security Bulletin |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
|
Связанные продукты
|
Adobe Reader Adobe Acrobat Adobe Reader XI Adobe Acrobat XI Adobe Acrobat Reader DC Continuous Adobe Acrobat Reader DC Classic Adobe Acrobat DC Continuous Adobe Acrobat DC Classic Adobe Acrobat Reader 2017 Adobe Acrobat 2017 Adobe Acrobat Reader |
CVE-IDS
|
CVE-2017-30389.3Critical
CVE-2017-112219.3Critical CVE-2017-112229.3Critical CVE-2017-112239.3Critical CVE-2017-112249.3Critical CVE-2017-112269.3Critical CVE-2017-112279.3Critical CVE-2017-112289.3Critical CVE-2017-112296.8High CVE-2017-112304.3Warning CVE-2017-112319.3Critical CVE-2017-112324.3Warning CVE-2017-112334.3Warning CVE-2017-112349.3Critical CVE-2017-112359.3Critical CVE-2017-112364.3Warning CVE-2017-112379.3Critical CVE-2017-112384.3Warning CVE-2017-112394.3Warning CVE-2017-112419.3Critical CVE-2017-112424.3Warning CVE-2017-112434.3Warning CVE-2017-112444.3Warning CVE-2017-112454.3Warning CVE-2017-112464.3Warning CVE-2017-112484.3Warning CVE-2017-112494.3Warning CVE-2017-112519.3Critical CVE-2017-112524.3Warning CVE-2017-112546.8High CVE-2017-112554.3Warning CVE-2017-112569.3Critical CVE-2017-112579.3Critical CVE-2017-112584.3Warning CVE-2017-112599.3Critical CVE-2017-112609.3Critical CVE-2017-112619.3Critical CVE-2017-112629.3Critical CVE-2017-112636.8High CVE-2017-112654.3Warning CVE-2017-112679.3Critical CVE-2017-112689.3Critical CVE-2017-112699.3Critical CVE-2017-112709.3Critical CVE-2017-112719.3Critical CVE-2017-30169.3Critical CVE-2017-31139.3Critical CVE-2017-31154.3Warning CVE-2017-31169.3Critical CVE-2017-31179.3Critical CVE-2017-31184.3Warning CVE-2017-31196.8High CVE-2017-31209.3Critical CVE-2017-31219.3Critical CVE-2017-31224.3Warning CVE-2017-31239.3Critical CVE-2017-112094.3Warning CVE-2017-112104.3Warning CVE-2017-112119.3Critical CVE-2017-112129.3Critical CVE-2017-112149.3Critical CVE-2017-112169.3Critical CVE-2017-112174.3Warning CVE-2017-112189.3Critical CVE-2017-112199.3Critical CVE-2017-112209.3Critical |
Эксплуатация
|
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Узнай статистику распространения уязвимостей в твоем регионе |