Kaspersky ID:
KLA12187
Дата обнаружения:
11/05/2021
Обновлено:
22/01/2024

Описание

Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, gain privileges.

Below is a complete list of vulnerabilities:

  1. A buffer overflow vulnerability can be exploited to execute arbitrary code.
  2. A heap buffer overflow vulnerability can be exploited to execute arbitrary code.
  3. An out of bounds read vulnerability can be exploited to cause denial of service or obtain sensitive information.
  4. An out of bounds read vulnerability can be exploited to obtain sensitive information.
  5. An out of bounds read vulnerability can be exploited to execute arbitrary code.
  6. An out of bound write vulnerability can be exploited to execute arbitrary code.
  7. An information disclosure vulnerability can be exploited to gain privileges or obtain sensitive information.
  8. A use after free vulnerability can be exploited to execute arbitrary code.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2021-21044
    critical
  • CVE-2021-21038
    high
  • CVE-2021-21086
    high
  • CVE-2021-28561
    high
  • CVE-2021-28560
    high
  • CVE-2021-28558
    high
  • CVE-2021-28557
    warning
  • CVE-2021-28555
    warning
  • CVE-2021-28565
    critical
  • CVE-2021-28564
    high
  • CVE-2021-28559
    warning
  • CVE-2021-28562
    high
  • CVE-2021-28550
    high
  • CVE-2021-28553
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Confirm changes?
Your message has been sent successfully.