Multiple vulnerabilities in Adobe Reader and Adobe Acrobat



Published: 2017-04-11 | Updated: 2017-11-15
Risk High
Patch available YES
Number of vulnerabilities 51
CVE-ID CVE- 2017-3014
CVE-2017-3026
CVE-2017-3027
CVE-2017-3035
CVE-2017-3047
CVE-2017-3057
CVE-2017-3042
CVE-2017-3048
CVE-2017-3049
CVE-2017-3055
CVE- 2017-3011
CVE- 2017-3034
CVE-2017-3012
CVE-2017-3013
CVE-2017-3015
CVE-2017-3017
CVE-2017-3018
CVE-2017-3019
CVE-2017-3023
CVE-2017-3024
CVE-2017-3025
CVE-2017-3028
CVE-2017-3030
CVE-2017-3036
CVE-2017-3037
CVE-2017-3038
CVE-2017-3039
CVE-2017-3040
CVE-2017-3041
CVE-2017-3044
CVE-2017-3050
CVE-2017-3051
CVE-2017-3054
CVE-2017-3056
CVE-2017-3065
CVE-2017-3020
CVE-2017-3021
CVE-2017-3022
CVE-2017-3029
CVE-2017-3031
CVE-2017-3032
CVE-2017-3033
CVE-2017-3043
CVE-2017-3045
CVE-2017-3046
CVE-2017-3052
CVE-2017-3053
CVE-2017-3034
CVE-2017-3017
CVE-2017-3014
CVE-2017-3011
CWE-ID CWE-416
CWE-122
CWE-190
CWE-426
CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Adobe Reader
Client/Desktop applications / Office applications

Adobe Acrobat
Client/Desktop applications / Office applications

Vendor Adobe

Security Bulletin

This security bulletin contains information about 51 vulnerabilities.

1) Use-after-free error

EUVDB-ID: #VU6202

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE- 2017-3014

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Use-after-free error

EUVDB-ID: #VU6203

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3026

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free error

EUVDB-ID: #VU6204

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3027

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Use-after-free error

EUVDB-ID: #VU6205

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3035

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free error

EUVDB-ID: #VU6206

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3047

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Use-after-free error

EUVDB-ID: #VU6207

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3057

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use-after-free error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Heap-based buffer overflow

EUVDB-ID: #VU6208

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3042

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to heap-based buffer overflow when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Heap-based buffer overflow

EUVDB-ID: #VU6209

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3048

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to heap-based buffer overflow when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Heap-based buffer overflow

EUVDB-ID: #VU6210

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3049

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to heap-based buffer overflow when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Heap-based buffer overflow

EUVDB-ID: #VU6211

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3055

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to heap-based buffer overflow when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Integer overflow

EUVDB-ID: #VU6212

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE- 2017-3011

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Integer overflow

EUVDB-ID: #VU6213

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE- 2017-3034

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Untrusted search path

EUVDB-ID: #VU6214

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3012

CWE-ID: CWE-426 - Untrusted Search Path

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the way the application loads .dll libraries. A remote attacker can place a specially crafted .dll file along with PDF document on a remote SMB or WebDav share, trick the victim into opening that document and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Untrusted search path

EUVDB-ID: #VU6215

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3013

CWE-ID: CWE-426 - Untrusted Search Path

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to the way the application loads .dll libraries. A remote attacker can place a specially crafted .dll file along with PDF document on a remote SMB or WebDav share, trick the victim into opening that document and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Memory corruption

EUVDB-ID: #VU6216

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3015

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Memory corruption

EUVDB-ID: #VU6217

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3017

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Memory corruption

EUVDB-ID: #VU6218

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3018

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Memory corruption

EUVDB-ID: #VU6219

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3019

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Memory corruption

EUVDB-ID: #VU6220

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3023

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Memory corruption

EUVDB-ID: #VU6221

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3024

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

21) Memory corruption

EUVDB-ID: #VU6222

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3025

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

22) Memory corruption

EUVDB-ID: #VU6223

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3028

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

23) Memory corruption

EUVDB-ID: #VU6224

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3030

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

24) Memory corruption

EUVDB-ID: #VU6225

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3036

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

25) Memory corruption

EUVDB-ID: #VU6226

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3037

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

26) Memory corruption

EUVDB-ID: #VU6227

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3038

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

The vulnerability was patched in https://helpx.adobe.com/security/products/acrobat/apsb17-24.html

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30352 or 2017.011.30059.
Update Adobe Reader and Acrobat to version 11.0.21.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

27) Memory corruption

EUVDB-ID: #VU6228

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3039

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

28) Memory corruption

EUVDB-ID: #VU6229

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3040

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

29) Memory corruption

EUVDB-ID: #VU6230

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3041

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

30) Memory corruption

EUVDB-ID: #VU6231

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3044

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

31) Memory corruption

EUVDB-ID: #VU6232

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3050

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

32) Memory corruption

EUVDB-ID: #VU6233

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3051

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

33) Memory corruption

EUVDB-ID: #VU6234

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3054

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

34) Memory corruption

EUVDB-ID: #VU6235

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3056

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

35) Memory corruption

EUVDB-ID: #VU6236

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3065

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in remote code execution.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

36) Memory corruption

EUVDB-ID: #VU6237

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3020

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

37) Memory corruption

EUVDB-ID: #VU6238

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3021

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

38) Memory corruption

EUVDB-ID: #VU6239

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3022

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

39) Memory corruption

EUVDB-ID: #VU6240

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3029

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

40) Memory corruption

EUVDB-ID: #VU6241

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3031

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

41) Memory corruption

EUVDB-ID: #VU6242

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3032

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

42) Memory corruption

EUVDB-ID: #VU6243

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3033

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

43) Memory corruption

EUVDB-ID: #VU6244

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3043

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

44) Memory corruption

EUVDB-ID: #VU6245

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3045

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

45) Memory corruption

EUVDB-ID: #VU6246

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3046

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

46) Memory corruption

EUVDB-ID: #VU6247

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3052

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

47) Memory corruption

EUVDB-ID: #VU6248

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3053

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to boundary error when handling malicious content. A remote unauthenticated attacker can create a specially crafted PDF file, trick the victim into opening it, trigger memory corruption and cause memory adress leak.

Successful exploitation of this vulnerability may result in information disclosure.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

48) Integer overflow

EUVDB-ID: #VU9336

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3034

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow vulnerability in the XML Forms Architecture (XFA) engine, related to layout functionality. A remote attacker can trick the victim into opening a specially crafted .pdf file, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

49) Memory corruption

EUVDB-ID: #VU9335

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3017

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when handling malicious input. A remote attacker can trick the victim into opening a specially crafted .pdf file, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

50) Use-after-free error

EUVDB-ID: #VU9332

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3014

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to use after free error in XML Forms Architecture (XFA) related to reset form functionality. A remote attacker can trick the victim into opening a specially crafted .pdf file, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

51) Integer overflow

EUVDB-ID: #VU9331

Risk: High

CVSSv3.1: 8.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2017-3011

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow vulnerability in the CCITT fax PDF filter. A remote attacker can trick the victim into opening a specially crafted .pdf file, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Update Adobe Reader DC and Acrobat DC to version 2015.006.30306 or 2017.009.20044.
Update Adobe Reader and Acrobat to version 11.0.20.

Vulnerable software versions

Adobe Reader: 11.0.19 - 2017.009.20044

Adobe Acrobat: 11.0.19 - 17.009.20044

External links

http://helpx.adobe.com/security/products/acrobat/apsb17-11.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open a file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###