Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Adobe Reader 2017 Security Updates(apsb20-24)-Windows
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Adobe Reader 2017 and is prone to multiple vulnerabilities.
Insight
Insight
Multiple flaws exists due to following errors, - A null pointer error. - Heap overflow. - Race condition. - Out-of-bounds write. - Security bypass. - Stack exhaustion. - Out-of-bounds read. - Buffer error. - Use-after-free. - Invalid memory access.
Affected Software
Affected Software
Adobe Reader 2017 version prior to 2017.011.30171 on Windows.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to Adobe Reader 2017 version 2017.011.30171 or later. Please see the references for more information.
Common Vulnerabilities and Exposures (CVE)
- CVE-2020-9610
- CVE-2020-9612
- CVE-2020-9615
- CVE-2020-9597
- CVE-2020-9594
- CVE-2020-9614
- CVE-2020-9613
- CVE-2020-9596
- CVE-2020-9592
- CVE-2020-9611
- CVE-2020-9609
- CVE-2020-9608
- CVE-2020-9603
- CVE-2020-9602
- CVE-2020-9601
- CVE-2020-9600
- CVE-2020-9599
- CVE-2020-9605
- CVE-2020-9604
- CVE-2020-9607
- CVE-2020-9606
- CVE-2020-9598
- CVE-2020-9595
- CVE-2020-9593