Multiple vulnerabilities in Adobe Reader and Acrobat

Published: 2018-12-11 17:37:37 | Updated: 2019-02-12
Severity High
Patch available YES
Number of vulnerabilities 86
CVE ID CVE-2018-15998
CVE-2018-15987
CVE-2018-16004
CVE-2018-19720
CVE-2018-16045
CVE-2018-16044
CVE-2018-19715
CVE-2018-19713
CVE-2018-19708
CVE-2018-19707
CVE-2018-19700
CVE-2018-19698
CVE-2018-16046
CVE-2018-16040
CVE-2018-16039
CVE-2018-16037
CVE-2018-16036
CVE-2018-16029
CVE-2018-16027
CVE-2018-16026
CVE-2018-16025
CVE-2018-16014
CVE-2018-16011
CVE-2018-16008
CVE-2018-16003
CVE-2018-15994
CVE-2018-15993
CVE-2018-15992
CVE-2018-15991
CVE-2018-15990
CVE-2018-19702
CVE-2018-16016
CVE-2018-16000
CVE-2018-15999
CVE-2018-15988
CVE-2018-19716
CVE-2018-16021
CVE-2018-12830
CVE-2018-19717
CVE-2018-19714
CVE-2018-19712
CVE-2018-19711
CVE-2018-19710
CVE-2018-19709
CVE-2018-19706
CVE-2018-19705
CVE-2018-19704
CVE-2018-19703
CVE-2018-19701
CVE-2018-19699
CVE-2018-16047
CVE-2018-16043
CVE-2018-16041
CVE-2018-16038
CVE-2018-16035
CVE-2018-16034
CVE-2018-16033
CVE-2018-16032
CVE-2018-16031
CVE-2018-16030
CVE-2018-16028
CVE-2018-16024
CVE-2018-16023
CVE-2018-16022
CVE-2018-16020
CVE-2018-16019
CVE-2018-16017
CVE-2018-16015
CVE-2018-16013
CVE-2018-16012
CVE-2018-16010
CVE-2018-16006
CVE-2018-16005
CVE-2018-16002
CVE-2018-16001
CVE-2018-15997
CVE-2018-15996
CVE-2018-15989
CVE-2018-15985
CVE-2018-15984
CVE-2018-19719
CVE-2018-16009
CVE-2018-16007
CVE-2018-15995
CVE-2018-15986
CVE-2018-16042
CVSSv3 8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
7.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
5.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
3.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
3.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
3.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
3.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
3.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CWE ID CWE-119
CWE-822
CWE-264
CWE-416
CWE-787
CWE-122
CWE-125
CWE-190
Exploitation vector Network
Public exploit N/A
Vulnerable software Adobe Acrobat DC
Adobe Acrobat Reader DC
Vulnerable software versions Adobe Acrobat DC 2015.006.30457
Adobe Acrobat DC 2015.006.30456
Adobe Acrobat DC 2015.006.30452

Show more

Adobe Acrobat Reader DC 2015.006.30457
Adobe Acrobat Reader DC 2015.006.30456
Adobe Acrobat Reader DC 2015.006.30452

Show more

Vendor URL Adobe

Security Advisory

1) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

2) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

3) Untrusted pointer dereference

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, dereference untrusted pointer and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

4) Untrusted pointer dereference

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, dereference untrusted pointer and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

5) Privilege escalation

Description

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to improper privileges and access controls. A remote attacker can trick the victim into opening a specially crafted .pdf file, bypass security restrictions and gain elevated privileges to conduct further attacks.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

6) Privilege escalation

Description

The vulnerability allows a remote attacker to gain elevated privileges on the target system.

The weakness exists due to improper privileges and access controls. A remote attacker can trick the victim into opening a specially crafted .pdf file, bypass security restrictions and gain elevated privileges to conduct further attacks.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

7) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

8) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

9) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

10) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

11) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

12) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

13) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

14) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

15) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

16) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

17) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

18) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

19) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

20) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

21) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

22) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

23) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30464, 2017.011.30113, 2019.010.20069.

External links

https://helpx.adobe.com/security/products/acrobat/apsb19-02.html

24) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

25) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

26) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

27) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

28) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

29) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

30) Use-after-free error

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

31) Out-of-bounds write

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

32) Out-of-bounds write

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

33) Out-of-bounds write

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

34) Out-of-bounds write

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

35) Out-of-bounds write

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

36) Heap-based buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to heap-based buffer overflow when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

37) Heap-based buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to heap-based buffer overflow when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

38) Heap-based buffer overflow

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to heap-based buffer overflow when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

39) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

40) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

41) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

42) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

43) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

44) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

45) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

46) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

47) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

48) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

49) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

50) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

51) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

52) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

53) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

54) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

55) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

56) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

57) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

58) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

59) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

60) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

61) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

62) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

63) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

64) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

65) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

66) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

67) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

68) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

69) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

70) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

71) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

72) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

73) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

74) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

75) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

76) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

77) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

78) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

79) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

80) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

81) Out-of-bounds read

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger out-of-bounds read and gain access to important data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

82) Integer overflow

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger integer overflow and gain access to arbitrary data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

83) Integer overflow

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger integer overflow and gain access to arbitrary data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

84) Integer overflow

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger integer overflow and gain access to arbitrary data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

85) Integer overflow

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger integer overflow and gain access to arbitrary data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

86) Information disclosure

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.

The weakness exists due to improper privileges and access controls. A remote attacker can trick the victim into opening a specially crafted .pdf file, bypass security restrictions and gain access to arbitrary data.

Remediation

The vulnerability has been addressed in the versions 2015.006.30461, 2017.011.30110, 2019.010.20064.

External links

https://helpx.adobe.com/security/products/acrobat/apsb18-41.html

Back to List