Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Adobe Reader 2017 Security Updates(apsb20-48)-MAC OS X

Information

Severity

Severity

Critical

Family

Family

General

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

This host is installed with Adobe Reader 2017 and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exists due to following errors, - Multiple Use-after-free errors. - Multiple Buffer errors. - Multiple Out-of-bounds write. - Multiple Out-of-bounds read. - Multiple Stack exhaustion errors. - Multiple Security bypass. - Multiple memory leak errors.

Affected Software

Affected Software

Adobe Reader DC 2015 (Classic) prior to version 2015.006.30527 on MAC OS X.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Adobe Reader DC 2015 (Classic) to version 2015.006.30527 or later. Please see the references for more information.