KLA11086
Multiple vulnerabilities in Adobe Acrobat and Adobe Reader
Обновлено: 15/02/2019
Дата обнаружения
08/08/2017
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Adobe Acrobat and Adobe Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information or execute arbitrary code.

Below is a complete list of vulnerabilities:

  1. Memory corruption vulnerability related to reading a JPEG file embedded within XPS (XML Paper Specification) file can be exploited remotely to execute arbitrary code;
  2. Memory corruption vulnerability related to font parsing can be exploited remotely via the font embedded within XPS file to execute arbitrary code;
  3. Heap overflow vulnerability in the JPEG parser can be exploited remotely to execute arbitrary code;
  4. Multiple memory corruption vulnerabilities in the image conversion engine which occur while processing EMF (Enhanced Metafile Format) data can be exploited remotely to execute arbitrary code;
  5. Use-after-free vulnerability in the XFA event management can be exploited remotely to execute arbitrary code;
  6. Use-after-free vulnerability in the XFA rendering engine can be exploited remotely to execute arbitrary code;
  7. Heap overflow vulnerability in an internal data structure can be exploited remotely to execute arbitrary code;
  8. Type confusion vulnerability in the annotation functionality can be exploited remotely to execute arbitrary code;
  9. Memory corruption vulnerability in the PRC (Product Representation Compact) can be exploited remotely to execute arbitrary code;
  10. Use-after-free vulnerability in the core of the XFA engine can be exploited remotely to execute arbitrary code;
  11. Multiple memory corruption vulnerabilities related to processing JPEG 2000 (JP2) code stream data in the image processing engine and in the image conversion engine can be exploited remotely to execute arbitrary code;
  12. Multiple memory corruption vulnerabilities related to processing EMF private data in the image conversion engine can be exploited remotely to execute arbitrary code;
  13. Security bypass vulnerability related to manipulating FDF (Forms Data Format) can be exploited remotely to execute arbitrary code;
  14. Multiple memory corruption vulnerabilities in the JPEG 2000 engine, in the font parsing module, in the XSLT engine, in the JPEG 2000 parsing module, in the AGM (Adobe Graphics Manager) module and in the PCX (picture exchange) file format parsing module can be exploited remotely to execute arbitrary code;
  15. Use-after-free vulnerability in Acrobat/Reader engine can be exploited remotely to execute arbitrary code;
  16. Use-after-free vulnerability related to brush manipulation which occurs while processing EMF (Enhanced Metafile Format) data can be exploited remotely to execute arbitrary code;
  17. Memory corruption vulnerability related to the way of storing pixels while processing TIFF data can be exploited remotely to execute arbitrary code;
  18. Use-after-free vulnerability in the image conversion engine related to decompressing JPEG data can be exploited remotely to execute arbitrary code;
  19. Memory corruption vulnerability related to the internal handling of UTF-16 literal strings can be exploited remotely to execute arbitrary code;
  20. Memory corruption vulnerability in the image conversion engine can be exploited remotely via specially designed EMF record to execute arbitrary code;
  21. Use-after-free vulnerability in the Acrobat/Reader’s JavaScript engine can be exploited remotely to execute arbitrary code;
  22. Memory corruption vulnerability in the image conversion engine related to processing TIFF color map data can be exploited remotely to execute arbitrary code;
  23. Use-after-free vulnerability related to generating content in the XFA layout engine can be exploited remotely to execute arbitrary code;
  24. Type confusion vulnerability in the XFA layout engine can be exploited remotely to execute arbitrary code;
  25. Multiple memory corruption vulnerabilities related to processing EMF private data interpreted as a GIF image or JPEG data in the image conversion engine can be exploited remotely to execute arbitrary code;
  26. Memory corruption vulnerability related to processing EMF private data and the embedded TIF image in the image conversion engine can be exploited remotely to execute arbitrary code;
  27. Memory corruption vulnerability related to document encoding in the internal data structure manipulation can be exploited remotely to execute arbitrary code;
  28. Memory corruption vulnerability related to processing EMF image stream data in the image conversion engine can be exploited remotely to execute arbitrary code;
  29. Memory corruption vulnerability related to processing EMF private data representing icons in the image conversion engine can be exploited remotely to execute arbitrary code;
  30. Memory corruption vulnerability can be exploited remotely to execute arbitrary code;
  31. Use-after-free vulnerability related to creating large strings in the JavaScript engine can be exploited remotely to execute arbitrary code;
  32. Insufficient verification of data authenticity related to handling links within the PDF can be exploited remotely to obtain sensitive information;
  33. Memory corruption vulnerability related to parsing TrueType font data in the MakeAccessible plugin can be exploited remotely to execute arbitrary code;
  34. Heap overflow vulnerability in the plugin which handles links within the PDF can be exploited remotely to execute arbitrary code;
  35. Multiple memory corruption vulnerability in the Acrobat/Reader engine and in the EMF parser can be exploited remotely to execute arbitrary code;
  36. Use-after-free vulnerability related to handling certain types of internal instructions in the XFA parsing engine can be exploited remotely to execute arbitrary code;
  37. Memory corruption vulnerability related to processing EMF data drawing position definition in the image conversion engine can be exploited remotely to execute arbitrary code;
  38. Memory corruption vulnerability related to parsing TTF (TrueType font format) stream data can be exploited remotely to execute arbitrary code.

Technical details

Vulnerabilities (4) are related to text output, rendering a path, bitmap transformations, drawing of Unicode text strings, curve drawing, text strings, polygons, line segments, transformation of blocks of pixels, drawing ASCII text string, transfer of pixel blocks, Bezier curves.

Пораженные продукты

Adobe Reader XI earlier than 11.0.21
Adobe Acrobat XI earlier than 11.0.21
Adobe Acrobat 2017 earlier than 17.011.30066
Adobe Acrobat Reader 2017 earlier than 17 17.011.30066
Adobe Acrobat DC Classic earlier than 15.006.30355
Adobe Acrobat DC Continuous earlier than 17.012.20098
Adobe Acrobat Reader DC Classic earlier than 15.006.30355 
Adobe Acrobat Reader DC Continuous earlier than 17.012.20098  

Решение

Update to the latest versions
Get Adobe Acrobat DC
Get Adobe Acrobat Reader DC
Get Adobe Reader XI

Первичный источник обнаружения
Adobe Security Bulletin
Update to Security Bulletin
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]
Связанные продукты
Adobe Reader
Adobe Acrobat
Adobe Reader XI
Adobe Acrobat XI
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat DC Classic
Adobe Acrobat Reader
CVE-IDS

CVE-2017-3038
CVE-2017-11221
CVE-2017-11222
CVE-2017-11223
CVE-2017-11224
CVE-2017-11226
CVE-2017-11227
CVE-2017-11228
CVE-2017-11229
CVE-2017-11230
CVE-2017-11231
CVE-2017-11232
CVE-2017-11233
CVE-2017-11234
CVE-2017-11235
CVE-2017-11236
CVE-2017-11237
CVE-2017-11238
CVE-2017-11239
CVE-2017-11241
CVE-2017-11242
CVE-2017-11243
CVE-2017-11244
CVE-2017-11245
CVE-2017-11246
CVE-2017-11248
CVE-2017-11249
CVE-2017-11251
CVE-2017-11252
CVE-2017-11254
CVE-2017-11255
CVE-2017-11256
CVE-2017-11257
CVE-2017-11258
CVE-2017-11259
CVE-2017-11260
CVE-2017-11261
CVE-2017-11262
CVE-2017-11263
CVE-2017-11265
CVE-2017-11267
CVE-2017-11268
CVE-2017-11269
CVE-2017-11270
CVE-2017-11271
CVE-2017-3016
CVE-2017-3113
CVE-2017-3115
CVE-2017-3116
CVE-2017-3117
CVE-2017-3118
CVE-2017-3119
CVE-2017-3120
CVE-2017-3121
CVE-2017-3122
CVE-2017-3123
CVE-2017-3124
CVE-2017-11209
CVE-2017-11210
CVE-2017-11211
CVE-2017-11212
CVE-2017-11214
CVE-2017-11216
CVE-2017-11217
CVE-2017-11218
CVE-2017-11219
CVE-2017-11220