Vulnerability Details

Adobe Acrobat Reader DC (Classic Track) Security Updates (apsb19-49) - Mac OS X

Published: 2019-10-16 06:32:55
CVE Author: NIST National Vulnerability Database

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
This host is installed with Adobe Acrobat Reader DC Classic 2015 and is prone to multiple vulnerabilities.

Detection Method:
Checks if a vulnerable version is present on the target host.

Technical Details:
Multiple flaws exists due to, - Multiple out-of-bounds read errors. - Multiple out-of-bounds write errors. - Multiple type confusion errors. - Multiple use after free errors. - Multiple heap overflow errors. - A buffer overrun error. - A cross site scripting error. - A race condition error. - An incomplete implementation of security mechanism. - An untrusted pointer dereference error.

Impact:
Successful exploitation will allow an attacker to gain access to sensitive information and run arbitrary code in context of current user.

Affected Versions:
Adobe Acrobat Reader DC Classic 2015 version 2015.x before 2015.006.30504 on Mac OS X.

Recommendations:
Upgrade to Adobe Acrobat DC Classic 2015 version 2015.006.30504 or later. Please see the references for more information.

Solution Type:
Vendor Patch

Detection Type:
Executable

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-8064
https://nvd.nist.gov/vuln/detail/CVE-2019-8160
https://nvd.nist.gov/vuln/detail/CVE-2019-8161
https://nvd.nist.gov/vuln/detail/CVE-2019-8162
https://nvd.nist.gov/vuln/detail/CVE-2019-8163
https://nvd.nist.gov/vuln/detail/CVE-2019-8164
https://nvd.nist.gov/vuln/detail/CVE-2019-8165
https://nvd.nist.gov/vuln/detail/CVE-2019-8166
https://nvd.nist.gov/vuln/detail/CVE-2019-8167
https://nvd.nist.gov/vuln/detail/CVE-2019-8168
https://nvd.nist.gov/vuln/detail/CVE-2019-8169
https://nvd.nist.gov/vuln/detail/CVE-2019-8170
https://nvd.nist.gov/vuln/detail/CVE-2019-8171
https://nvd.nist.gov/vuln/detail/CVE-2019-8172
https://nvd.nist.gov/vuln/detail/CVE-2019-8173
https://nvd.nist.gov/vuln/detail/CVE-2019-8174
https://nvd.nist.gov/vuln/detail/CVE-2019-8175
https://nvd.nist.gov/vuln/detail/CVE-2019-8176
https://nvd.nist.gov/vuln/detail/CVE-2019-8177
https://nvd.nist.gov/vuln/detail/CVE-2019-8178
https://nvd.nist.gov/vuln/detail/CVE-2019-8179
https://nvd.nist.gov/vuln/detail/CVE-2019-8180
https://nvd.nist.gov/vuln/detail/CVE-2019-8181
https://nvd.nist.gov/vuln/detail/CVE-2019-8182
https://nvd.nist.gov/vuln/detail/CVE-2019-8183
https://nvd.nist.gov/vuln/detail/CVE-2019-8184
https://nvd.nist.gov/vuln/detail/CVE-2019-8185
https://nvd.nist.gov/vuln/detail/CVE-2019-8186
https://nvd.nist.gov/vuln/detail/CVE-2019-8187
https://nvd.nist.gov/vuln/detail/CVE-2019-8188
https://nvd.nist.gov/vuln/detail/CVE-2019-8189
https://nvd.nist.gov/vuln/detail/CVE-2019-8190
https://nvd.nist.gov/vuln/detail/CVE-2019-8191
https://nvd.nist.gov/vuln/detail/CVE-2019-8192
https://nvd.nist.gov/vuln/detail/CVE-2019-8193
https://nvd.nist.gov/vuln/detail/CVE-2019-8194
https://nvd.nist.gov/vuln/detail/CVE-2019-8195
https://nvd.nist.gov/vuln/detail/CVE-2019-8196
https://nvd.nist.gov/vuln/detail/CVE-2019-8197
https://nvd.nist.gov/vuln/detail/CVE-2019-8198
https://nvd.nist.gov/vuln/detail/CVE-2019-8199
https://nvd.nist.gov/vuln/detail/CVE-2019-8200
https://nvd.nist.gov/vuln/detail/CVE-2019-8201
https://nvd.nist.gov/vuln/detail/CVE-2019-8202
https://nvd.nist.gov/vuln/detail/CVE-2019-8203
https://nvd.nist.gov/vuln/detail/CVE-2019-8204
https://nvd.nist.gov/vuln/detail/CVE-2019-8205
https://nvd.nist.gov/vuln/detail/CVE-2019-8206
https://nvd.nist.gov/vuln/detail/CVE-2019-8207
https://nvd.nist.gov/vuln/detail/CVE-2019-8208
https://nvd.nist.gov/vuln/detail/CVE-2019-8209
https://nvd.nist.gov/vuln/detail/CVE-2019-8210
https://nvd.nist.gov/vuln/detail/CVE-2019-8211
https://nvd.nist.gov/vuln/detail/CVE-2019-8212
https://nvd.nist.gov/vuln/detail/CVE-2019-8213
https://nvd.nist.gov/vuln/detail/CVE-2019-8214
https://nvd.nist.gov/vuln/detail/CVE-2019-8215
https://nvd.nist.gov/vuln/detail/CVE-2019-8216
https://nvd.nist.gov/vuln/detail/CVE-2019-8217
https://nvd.nist.gov/vuln/detail/CVE-2019-8218
https://nvd.nist.gov/vuln/detail/CVE-2019-8219
https://nvd.nist.gov/vuln/detail/CVE-2019-8220
https://nvd.nist.gov/vuln/detail/CVE-2019-8221
https://nvd.nist.gov/vuln/detail/CVE-2019-8222
https://nvd.nist.gov/vuln/detail/CVE-2019-8223
https://nvd.nist.gov/vuln/detail/CVE-2019-8224
https://nvd.nist.gov/vuln/detail/CVE-2019-8225
https://nvd.nist.gov/vuln/detail/CVE-2019-8226

CVE Analysis

https://www.mageni.net/cve/CVE-2019-8064
https://www.mageni.net/cve/CVE-2019-8160
https://www.mageni.net/cve/CVE-2019-8161
https://www.mageni.net/cve/CVE-2019-8162
https://www.mageni.net/cve/CVE-2019-8163
https://www.mageni.net/cve/CVE-2019-8164
https://www.mageni.net/cve/CVE-2019-8165
https://www.mageni.net/cve/CVE-2019-8166
https://www.mageni.net/cve/CVE-2019-8167
https://www.mageni.net/cve/CVE-2019-8168
https://www.mageni.net/cve/CVE-2019-8169
https://www.mageni.net/cve/CVE-2019-8170
https://www.mageni.net/cve/CVE-2019-8171
https://www.mageni.net/cve/CVE-2019-8172
https://www.mageni.net/cve/CVE-2019-8173
https://www.mageni.net/cve/CVE-2019-8174
https://www.mageni.net/cve/CVE-2019-8175
https://www.mageni.net/cve/CVE-2019-8176
https://www.mageni.net/cve/CVE-2019-8177
https://www.mageni.net/cve/CVE-2019-8178
https://www.mageni.net/cve/CVE-2019-8179
https://www.mageni.net/cve/CVE-2019-8180
https://www.mageni.net/cve/CVE-2019-8181
https://www.mageni.net/cve/CVE-2019-8182
https://www.mageni.net/cve/CVE-2019-8183
https://www.mageni.net/cve/CVE-2019-8184
https://www.mageni.net/cve/CVE-2019-8185
https://www.mageni.net/cve/CVE-2019-8186
https://www.mageni.net/cve/CVE-2019-8187
https://www.mageni.net/cve/CVE-2019-8188
https://www.mageni.net/cve/CVE-2019-8189
https://www.mageni.net/cve/CVE-2019-8190
https://www.mageni.net/cve/CVE-2019-8191
https://www.mageni.net/cve/CVE-2019-8192
https://www.mageni.net/cve/CVE-2019-8193
https://www.mageni.net/cve/CVE-2019-8194
https://www.mageni.net/cve/CVE-2019-8195
https://www.mageni.net/cve/CVE-2019-8196
https://www.mageni.net/cve/CVE-2019-8197
https://www.mageni.net/cve/CVE-2019-8198
https://www.mageni.net/cve/CVE-2019-8199
https://www.mageni.net/cve/CVE-2019-8200
https://www.mageni.net/cve/CVE-2019-8201
https://www.mageni.net/cve/CVE-2019-8202
https://www.mageni.net/cve/CVE-2019-8203
https://www.mageni.net/cve/CVE-2019-8204
https://www.mageni.net/cve/CVE-2019-8205
https://www.mageni.net/cve/CVE-2019-8206
https://www.mageni.net/cve/CVE-2019-8207
https://www.mageni.net/cve/CVE-2019-8208
https://www.mageni.net/cve/CVE-2019-8209
https://www.mageni.net/cve/CVE-2019-8210
https://www.mageni.net/cve/CVE-2019-8211
https://www.mageni.net/cve/CVE-2019-8212
https://www.mageni.net/cve/CVE-2019-8213
https://www.mageni.net/cve/CVE-2019-8214
https://www.mageni.net/cve/CVE-2019-8215
https://www.mageni.net/cve/CVE-2019-8216
https://www.mageni.net/cve/CVE-2019-8217
https://www.mageni.net/cve/CVE-2019-8218
https://www.mageni.net/cve/CVE-2019-8219
https://www.mageni.net/cve/CVE-2019-8220
https://www.mageni.net/cve/CVE-2019-8221
https://www.mageni.net/cve/CVE-2019-8222
https://www.mageni.net/cve/CVE-2019-8223
https://www.mageni.net/cve/CVE-2019-8224
https://www.mageni.net/cve/CVE-2019-8225
https://www.mageni.net/cve/CVE-2019-8226

References:

https://helpx.adobe.com/security/products/acrobat/apsb19-49.html

Severity
High
CVSS Score
10.0
Published
2019-10-16
Modified
2019-10-17
Category
General

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.