Lucene search

K
kasperskyKaspersky LabKLA10935
HistoryJan 05, 2017 - 12:00 a.m.

KLA10935 Multiple vulnerabilities in Adobe Acrobat and Adobe Reader

2017-01-0500:00:00
Kaspersky Lab
threats.kaspersky.com
178

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.779 High

EPSS

Percentile

98.3%

Multiple serious vulnerabilities have been found in Adobe Acrobat and Adobe Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code or bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A type confusion vulnerability in the XSLT engine related to localization functionality can be exploited remotely to execute arbitrary code;
  2. Use-after-free vulnerabilities in XFA engine, which are related to layout functionality, sub-form functionality and validation functionality can be exploited remotely to execute arbitrary code;
  3. Use-after-free vulnerabilities in JavaScript engine can be exploited remotely to execute arbitrary code;
  4. Heap buffer overflow vulnerabilities while processing and parsing TIFF image data can be exploited remotely to execute arbitrary code;
  5. Heap buffer overflow vulnerability while parsing the segment for storing non-graphic information can be exploited remotely to execute arbitrary code;
  6. Heap buffer overflow vulnerability in the XSLT engine can be exploited remotely to execute arbitrary code;
  7. Heap buffer overflow vulnerabilities in the image conversion engine, which are related to parsing of color profile metadata and parsing malformed TIFF segments can be exploited remotely to execute arbitrary code;
  8. Buffer overflow/underflow vulnerabilities in XFA engine and the image conversion module related to parsing tags in TIFF files can be exploited remotely to execute arbitrary code;
  9. Memory corruption vulnerabilities in processing a malformed cross-reference table, JPEG 2000 files, Compact Format data, tags in TIFF images can be exploited remotely to execute arbitrary code;
  10. Memory corruption vulnerabilities in parsing of crafted TIFF image, image conversion module when processing TIFF image files or handling malformed ones can be exploited remotely to execute arbitrary code;
  11. Memory corruption vulnerabilities in image conversion engine related to parsing of EXIF (JPEG EXIF) metadata, TIFF file parsing and handling of the color profile in a TIFF file can be exploited remotely to execute arbitrary code;
  12. Memory corruption vulnerability in the XFA engine related to structure and organization of a form can be exploited remotely to execute arbitrary code;
  13. Vulnerability occuring while manipulating Form Data Format (FDF) can be exploited remotely to bypass security restrictions;
  14. Heap buffer overflow vulnerabilities in the JPEG decoder routine and in the XSLT engine related to template manipulation can be exploited remotely to execute arbitrary code;
  15. Memory corruption vulnerability in the image conversion module related to JPEG parsing can be exploited remotely to execute arbitrary code.

NB: Not every vulnerability already have CVSS rating so cumulative CVSS rating can be not representative.

NB: At this moment Adobe has just reserved CVE numbers for some of these vulnerabilities. Information can be changed soon.

Original advisories

APSB17-01

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Adobe-Reader-XI

Adobe-Acrobat-XI

Adobe-Acrobat-Reader-DC-Continuous

Adobe-Acrobat-Reader-DC-Classic

Adobe-Acrobat-DC-Continuous

Adobe-Acrobat-DC-Classic

CVE list

CVE-2017-2939 critical

CVE-2017-2940 critical

CVE-2017-2941 critical

CVE-2017-2942 critical

CVE-2017-2943 critical

CVE-2017-2944 critical

CVE-2017-2945 critical

CVE-2017-2946 critical

CVE-2017-2947 warning

CVE-2017-2948 critical

CVE-2017-2972 critical

CVE-2017-2971 critical

CVE-2017-2970 critical

CVE-2017-2967 critical

CVE-2017-2966 critical

CVE-2017-2965 critical

CVE-2017-2964 critical

CVE-2017-2963 critical

CVE-2017-2962 critical

CVE-2017-2961 critical

CVE-2017-2960 critical

CVE-2017-2959 critical

CVE-2017-2958 critical

CVE-2017-2957 critical

CVE-2017-2956 critical

CVE-2017-2955 critical

CVE-2017-2954 critical

CVE-2017-2953 critical

CVE-2017-2952 critical

CVE-2017-2951 critical

CVE-2017-2950 critical

CVE-2017-2949 critical

Solution

Update to the latest versionGet Adobe Acrobat Reader DCGet Adobe Reader XI

Get Adobe Acrobat DC

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Adobe Reader XI 11.0.18 and earlier versions  Adobe Acrobat XI 11.0.18 and earlier versionsAdobe Acrobat DC Classic 15.006.30244 and earlier versions Adobe Acrobat DC Continuous 15.020.20042 and earlier versionsAdobe Acrobat Reader DC Classic 15.006.30244 and earlier versions Adobe Acrobat Reader DC Continuous 15.020.20042 and earlier versions

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.779 High

EPSS

Percentile

98.3%