Show vulnerabilities with patch / with exploit

Multiple vulnerabilities in Adobe Reader and Acrobat



Published: 2018-08-14
Severity High
Patch available YES
Number of vulnerabilities 2
CVE ID CVE-2018-12808
CVE-2018-12799
CWE ID CWE-787
CWE-822
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Adobe Acrobat Reader DC
Client/Desktop applications / Office applications

Adobe Acrobat DC
Client/Desktop applications / Office applications

Vendor Adobe

Security Advisory

1) Out-of-bounds write

Severity: High

CVSSv3: 8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2018-12808

CWE-ID: CWE-787 - Out-of-bounds Write

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to out-of-bounds write when handling malicious input. A remote unauthenticated attacker can trick the victim into opening a specially crafted .pdf file, trigger memory corruption and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

The vulnerability has been addressed in the versions 2015.006.30448, 2017.011.30099, 2018.011.20058.

Vulnerable software versions

Adobe Acrobat Reader DC: 2015.006.30306, 2015.006.30355, 2015.006.30392, 2015.006.30394, 2015.006.30413, 2015.006.30417, 2015.006.30418, 2015.006.30434, 2017.011.30079, 2017.011.30080, 2017.011.30096, 2018.011.20035, 2018.011.20038, 2018.011.20040, 2018.011.20055

Adobe Acrobat DC: 2015.006.30306, 2015.006.30355, 2015.006.30392, 2015.006.30394, 2015.006.30413, 2015.006.30417, 2015.006.30418, 2015.006.30434, 2017.011.30079, 2017.011.30080, 2017.011.30096, 2018.011.20035, 2018.011.20038, 2018.011.20040, 2018.011.20055

CPE External links

https://helpx.adobe.com//security/products/acrobat/apsb18-29.html

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open an attachment in an e-mail message.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Untrusted pointer dereference

Severity: High

CVSSv3: 8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2018-12799

CWE-ID: CWE-822 - Untrusted Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to untrusted pointer dereference when handling malicious input. A remote unauthenticated attacker can trick the victim into opening a specially crafted .pdf file and execute arbitrary code with elevated privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

The vulnerability has been addressed in the versions 2015.006.30448, 2017.011.30099, 2018.011.20058.

Vulnerable software versions

Adobe Acrobat Reader DC: 2015.006.30306, 2015.006.30355, 2015.006.30392, 2015.006.30394, 2015.006.30413, 2015.006.30417, 2015.006.30418, 2015.006.30434, 2017.011.30079, 2017.011.30080, 2017.011.30096, 2018.011.20035, 2018.011.20038, 2018.011.20040, 2018.011.20055

Adobe Acrobat DC: 2015.006.30306, 2015.006.30355, 2015.006.30392, 2015.006.30394, 2015.006.30413, 2015.006.30417, 2015.006.30418, 2015.006.30434, 2017.011.30079, 2017.011.30080, 2017.011.30096, 2018.011.20035, 2018.011.20038, 2018.011.20040, 2018.011.20055

CPE External links

https://helpx.adobe.com//security/products/acrobat/apsb18-29.html

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to visit a specially crafted website or open an attachment in an e-mail message.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.