Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Adobe Acrobat Reader 2017 Security Updates (apsb19-41)-Windows

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

4 years ago

Modified

Modified

4 years ago

Summary

This host is installed with Adobe Acrobat Reader 2017 and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exist due to, - Out of bounds read error. - Out of bounds write error. - Command injection. - Use after free error. - Heap overflow error. - Buffer error. - Double free error. - Integer overflow error. - Internal IP disclosure error. - Type confusion. - Untrusted pointer dereference error.

Affected Software

Affected Software

Adobe Acrobat Reader 2017.011.30143 and earlier versions on Windows.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Adobe Acrobat Reader 2017 version 2017.011.30144 or later. Please see the references for more information.