Kaspersky ID:
KLA11708
Дата обнаружения:
17/03/2020
Обновлено:
06/04/2026

Описание

Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.

Below is a complete list of vulnerabilities:

  1. Memory address leak vulnerability can be exploited to obtain sensitive information.
  2. Out of bounds read  vulnerability can be exploited to obtain sensitive information.
  3. Out of bounds write vulnerability can be exploited to execute arbitrary code.
  4. Use after free vulnerability can be exploited to execute arbitrary code.
  5. Buffer overflow vulnerability can be exploited to execute arbitrary code.
  6. Memory corruption vulnerability can be exploited to execute arbitrary code.
  7. Insecure library loading (DLL hijacking) vulnerability can be exploited to gain privileges.
  8. Stack-based buffer overflow vulnerability can be exploited to execute arbitrary code.

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2020-3800
    critical
  • CVE-2020-3804
    critical
  • CVE-2020-3795
    critical
  • CVE-2020-3793
    critical
  • CVE-2020-3792
    critical
  • CVE-2020-3805
    critical
  • CVE-2020-3807
    critical
  • CVE-2020-3801
    critical
  • CVE-2020-3797
    critical
  • CVE-2020-3802
    critical
  • CVE-2020-3803
    critical
  • CVE-2020-3799
    critical
  • CVE-2020-3806
    critical

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Do you want to save your changes?
Your message has been sent successfully.