Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Adobe Acrobat Reader DC (Classic Track) Multiple Vulnerabilities-apsb17-36 (Windows)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Adobe Acrobat Reader DC (Classic Track) and is prone to multiple vulnerabilities.
Insight
Insight
Multiple flaws exist due to, - Two access of uninitialized point vulnerabilities that could result in remote could execution, - Six use after free vulnerabilities that could result in remote code execution. - Five buffer access with incorrect length value vulnerabilities that could result in remote code execution. - Six buffer over-read vulnerabilities that could result in remote code execution. - A buffer overflow vulnerability that could result in remote code execution. - A heap overflow vulnerability that could result in remote code execution. - Two improper validation of array index vulnerabilities that could result in remote code execution. - Multiple out-of-bounds read vulnerabilities that could result in remote code execution. - Four out-of-bounds write vulnerabilities that could result in remote code execution. - Two security bypass vulnerabilities that could result in drive-by-downloads. - A security bypass vulnerability that could result in information disclosure. - A security bypass vulnerability that could result in remote code execution. - A stack exhaustion vulnerability that could result in excessive resource consumption. - Three type confusion vulnerabilities that could result in remote code execution. - Six untrusted pointer dereference vulnerabilities that could result in remote code execution. - For more details, refer the reference links mentioned.
Affected Software
Affected Software
Adobe Acrobat Reader DC (Classic Track) 2015.006.30355 and earlier versions on Windows.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Adobe Acrobat DC (Classic Track) version 2015.006.30392 or later.
Common Vulnerabilities and Exposures (CVE)
- CVE-2017-16377
- CVE-2017-16378
- CVE-2017-16360
- CVE-2017-16388
- CVE-2017-16389
- CVE-2017-16390
- CVE-2017-16393
- CVE-2017-16398
- CVE-2017-16381
- CVE-2017-16385
- CVE-2017-16392
- CVE-2017-16395
- CVE-2017-16396
- CVE-2017-16363
- CVE-2017-16365
- CVE-2017-16374
- CVE-2017-16384
- CVE-2017-16386
- CVE-2017-16387
- CVE-2017-16368
- CVE-2017-16383
- CVE-2017-16391
- CVE-2017-16410
- CVE-2017-16362
- CVE-2017-16370
- CVE-2017-16376
- CVE-2017-16382
- CVE-2017-16394
- CVE-2017-16397
- CVE-2017-16399
- CVE-2017-16400
- CVE-2017-16401
- CVE-2017-16402
- CVE-2017-16403
- CVE-2017-16404
- CVE-2017-16405
- CVE-2017-16408
- CVE-2017-16409
- CVE-2017-16412
- CVE-2017-16414
- CVE-2017-16417
- CVE-2017-16418
- CVE-2017-16420
- CVE-2017-11293
- CVE-2017-16407
- CVE-2017-16413
- CVE-2017-16415
- CVE-2017-16416
- CVE-2017-16361
- CVE-2017-16366
- CVE-2017-16369
- CVE-2017-16380
- CVE-2017-16419
- CVE-2017-16367
- CVE-2017-16379
- CVE-2017-16406
- CVE-2017-16364
- CVE-2017-16371
- CVE-2017-16372
- CVE-2017-16373
- CVE-2017-16375
- CVE-2017-16411
- CVE-2017-11307
- CVE-2017-11308
- CVE-2017-11240
- CVE-2017-11250
- CVE-2017-11306
- CVE-2017-11253