Kaspersky ID:
KLA12586
Дата обнаружения:
12/07/2022
Обновлено:
31/03/2025

Описание

Multiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service.

Below is a complete list of vulnerabilities:

  1. Use after free vulnerability in media can be exploited to execute arbitrary code.
  2. Out of bounds memory write vulnerability can be exploited to execute arbitrary code.
  3. Use after free vulnerability in media can be exploited to cause denial of service.
  4. Uninitialized pointer vulnerability can be exploited to execute arbitrary code.
  5. Out of bounds memory read vulnerability can be exploited to cause denial of service.
  6. Out of bounds memory read vulnerability can be exploited to execute arbitrary code.
  7. Type confusion vulnerability can be exploited to execute arbitrary code.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2022-34225
    critical
  • CVE-2022-34217
    critical
  • CVE-2022-34233
    high
  • CVE-2022-34228
    critical
  • CVE-2022-34224
    critical
  • CVE-2022-34239
    high
  • CVE-2022-34229
    critical
  • CVE-2022-34223
    critical
  • CVE-2022-34220
    critical
  • CVE-2022-34234
    high
  • CVE-2022-34222
    critical
  • CVE-2022-34216
    critical
  • CVE-2022-34219
    critical
  • CVE-2022-34221
    critical
  • CVE-2022-34238
    high
  • CVE-2022-34237
    high
  • CVE-2022-34230
    critical
  • CVE-2022-34227
    critical
  • CVE-2022-34226
    critical
  • CVE-2022-34232
    high
  • CVE-2022-34215
    critical
  • CVE-2022-34236
    high
  • CVE-2022-35669
    high

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.