Kaspersky ID:
KLA11622
Дата обнаружения:
18/11/2019
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Adobe Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.

Below is a complete list of vulnerabilities:

  1. Use After Free vulnerability can be exploited to execute arbitrary code
  2. Untrusted Pointer Dereference vulnerability can be exploited to execute arbitrary code
  3. Out-of-Bounds Write vulnerability can be exploited to execute arbitrary code
  4. Out-of-Bounds Read vulnerability can be exploited to obtain sensitive information
  5. Security Bypass vulnerability can be exploited to execute arbitrary code
  6. Heap Overflow vulnerability can be exploited to execute arbitrary code
  7. Buffer Error vulnerability can be exploited to execute arbitrary code
  8. Binary Planting (default folder privilege escalation) vulnerability can be exploited to gain privileges

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2019-16448
    critical
  • CVE-2019-16460
    critical
  • CVE-2019-16454
    critical
  • CVE-2019-16449
    warning
  • CVE-2019-16446
    critical
  • CVE-2019-16458
    warning
  • CVE-2019-16450
    critical
  • CVE-2019-16459
    critical
  • CVE-2019-16456
    warning
  • CVE-2019-16464
    critical
  • CVE-2019-16461
    warning
  • CVE-2019-16457
    warning
  • CVE-2019-16465
    warning
  • CVE-2019-16453
    critical
  • CVE-2019-16451
    critical
  • CVE-2019-16452
    critical
  • CVE-2019-16445
    critical
  • CVE-2019-16462
    critical
  • CVE-2019-16444
    critical
  • CVE-2019-16463
    critical
  • CVE-2019-16455
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.