Multiple vulnerabilities in Adobe Reader and Acrobat



Published: 2021-02-10 | Updated: 2021-12-03
Risk Critical
Patch available YES
Number of vulnerabilities 26
CVE-ID CVE-2021-21062
CVE-2021-21021
CVE-2021-21028
CVE-2021-21033
CVE-2021-21035
CVE-2021-21039
CVE-2021-21040
CVE-2021-21041
CVE-2021-21060
CVE-2021-21057
CVE-2021-21063
CVE-2021-21059
CVE-2021-21017
CVE-2021-21058
CVE-2021-21038
CVE-2021-21044
CVE-2021-21061
CVE-2021-21034
CVE-2021-21042
CVE-2021-21045
CVE-2021-21036
CVE-2021-21037
CVE-2021-21046
CVE-2021-21086
CVE-2021-21088
CVE-2021-21089
CWE-ID CWE-119
CWE-416
CWE-20
CWE-476
CWE-122
CWE-787
CWE-125
CWE-284
CWE-190
CWE-22
Exploitation vector Network
Public exploit Vulnerability #13 is being exploited in the wild.
Public exploit code for vulnerability #19 is available.
Public exploit code for vulnerability #24 is available.
Vulnerable software
Subscribe
Adobe Acrobat
Client/Desktop applications / Office applications

Adobe Reader
Client/Desktop applications / Office applications

Vendor Adobe

Security Bulletin

This security bulletin contains information about 26 vulnerabilities.

Updated: 18.03.2021

Added vulnerabilities #24-26.

Updated: 11.05.2021

Changed information about affected versions and added link to another Adobe bulletin for vulnerabilities #15,16 and 24.

1) Memory corruption

EUVDB-ID: #VU50547

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21062

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a buffer overflow and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

2) Use-after-free

EUVDB-ID: #VU50543

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21021

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

3) Use-after-free

EUVDB-ID: #VU50542

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21028

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

4) Use-after-free

EUVDB-ID: #VU50541

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21033

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

5) Use-after-free

EUVDB-ID: #VU50540

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21035

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

6) Use-after-free

EUVDB-ID: #VU50539

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21039

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

7) Use-after-free

EUVDB-ID: #VU50538

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21040

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

8) Use-after-free

EUVDB-ID: #VU50537

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21041

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

9) Improper input validation

EUVDB-ID: #VU50552

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-21060

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

10) NULL pointer dereference

EUVDB-ID: #VU50544

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-21057

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a NULL pointer dereference error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a NULL pointer dereference error and gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

11) Memory corruption

EUVDB-ID: #VU50548

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21063

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a buffer overflow and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

12) Memory corruption

EUVDB-ID: #VU50546

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21059

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a buffer overflow and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

13) Heap-based buffer overflow

EUVDB-ID: #VU50530

Risk: Critical

CVSSv3.1:

CVE-ID: CVE-2021-21017

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDf file, trick the victim into opening it, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability is being actively exploited in the wild.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

14) Memory corruption

EUVDB-ID: #VU50545

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21058

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a buffer overflow and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

15) Out-of-bounds write

EUVDB-ID: #VU50550

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21038

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a buffer overflow and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html
http://helpx.adobe.com/security/products/acrobat/apsb21-29.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

16) Out-of-bounds write

EUVDB-ID: #VU50549

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21044

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a buffer overflow and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html
http://helpx.adobe.com/security/products/acrobat/apsb21-29.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

17) Use-after-free

EUVDB-ID: #VU50551

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-21061

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a use-after-free error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and gain access to sensitive information.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

18) Out-of-bounds read

EUVDB-ID: #VU50536

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-21034

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

19) Out-of-bounds read

EUVDB-ID: #VU50535

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-21042

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

20) Improper access control

EUVDB-ID: #VU50534

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21045

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

21) Integer overflow

EUVDB-ID: #VU50533

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21036

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

22) Path traversal

EUVDB-ID: #VU50532

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21037

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences within PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it and overwrite arbitrary files on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise the affected system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

23) Buffer overflow

EUVDB-ID: #VU50531

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2021-21046

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF document, trick the victim into opening it, trigger memory corruption and crash the application.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

24) Out-of-bounds write

EUVDB-ID: #VU51575

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21086

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a buffer overflow and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html
http://helpx.adobe.com/security/products/acrobat/apsb21-29.html

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

25) Use-after-free

EUVDB-ID: #VU51574

Risk: High

CVSSv3.1:

CVE-ID: CVE-2021-21088

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the colorConvertPage method when processing PDF files. A remote attacker can create a specially crafted PDF file, trick the victim into opening it, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html
http://www.zerodayinitiative.com/advisories/ZDI-21-335/

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?

26) Out-of-bounds read

EUVDB-ID: #VU51573

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2021-21089

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the handling of URIs by weblink.api. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Adobe Acrobat: 20.001.30002 - 20.013.20074, 2015.006.30306 - 2015.006.30527, 2017.008.30051 - 2017.012.20098, 2018.011.20055

Adobe Reader: 2020.001.30005 - 2020.013.20074, 2019.008.20071 - 2019.021.20061, 2015.006.30306 - 2015.006.30523, 2017.009.20044 - 2017.012.20098, 2018.009.20044 - 2018.011.20063


CPE2.3 External links

http://helpx.adobe.com/security/products/acrobat/apsb21-09.html
http://www.zerodayinitiative.com/advisories/ZDI-21-336/

Q & A

Can this vulnerability be exploited remotely?

How the attacker can exploit this vulnerability?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###